Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Payloads
biblio
An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
queueing theory
MQTT broker
MQTT protocol
MQTT Thing-to-Thing Security
MQTT-TLS
MQTT-TTS
Payloads
Protocols
pubcrawl
Metrics
resilience
Resiliency
secure data exchange
telemetry
thing-to-broker channel encryption
Thing-to-Thing Security enhancement
Transport Layer Security
Human behavior
composability
computer network security
Cryptographic Protocols
data communication
data exchange protocol
electronic data interchange
encryption
end-to-end security
ciphertext-policy attribute based encryption
Human Factors
Internet of Things
Internet of things environment
IoT application developers
IoT security
massive IoT devices
Message Queue Telemetry Transport
biblio
Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units
Submitted by aekwall on Mon, 07/20/2020 - 10:42am
Intelligent Transportation Systems
Vehicular security
Plugs
low cost CAN probe
electronic control units
defined analysis tools
controller area networks
car generation
CAN bus attacks
Brakes
autonomous vehicles
automotive control area network bus
attack scenarios
connected vehicles
automobiles
automotive electronics
controller area network security
Payloads
Engines
Probes
security protocols
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Perceptually Transparent Robust Audio Watermarking Algorithm Using Multi Resolution Decomposition Cordic QR Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
information security
Watermarking
Signal to noise ratio
Signal resolution
Signal processing algorithms
Robustness
robust audio watermarking algorithm
pubcrawl
perceptual transparency
Payloads
multiresolution decomposition
Multi Resolution Decomposition
Metrics
audio coding
embedded watermark
digital watermarking
decomposition
data hiding
cyber physical systems
cordic QR decomposition
Compositionality
binary data embedding capacity
AWGN
audio watermarking
audio signal processing attacks
biblio
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IIoT devices
typical IoT devices
security bootstrapping
Scalability
Resiliency
resilience
pubcrawl
Production facilities
performance evaluation
Payloads
manual device configuration
intranets
Internet of Things devices
Internet of Things
Inspection
industrial enterprise networks
authorisation
enterprise management
DPI-enabled intranets
DPI proxy certificate authority certificates
DPI proxy CA
DPI policies
deep packet inspection proxies
deep packet inspection
Cryptography
conventional computing devices
computer network security
computer bootstrapping
chicken-and-egg problem
certification
bootstrapping security configuration
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Computer network intrusion detection using sequential LSTM Neural Networks autoencoders
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
Unsupervised Learning
variable length data sequence
sequential LSTM Neural Networks autoencoders
sequential intrusion detection
sequential data
sequential autoencoder
network data sequence
long short term memory neural network
GRU
fixed length data sequence
computer network intrusion detection
computer network data
Bi-LSTM
autoencoders
encoding
LSTM
computer network security
computer networks
Payloads
Intrusion Detection
Training
network intrusion detection
Neural networks
neural nets
Decoding
Metrics
Iterative methods
composability
pubcrawl
Resiliency
feature extraction
biblio
Network Coding for Critical Infrastructure Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
Predictive Metrics
store-and-forward paradigm
programmable networks
programmable data-planes
P4 ecosystem
linear network coding
linear NC functions
intermediate network
Critical Infrastructure Networks
atomic coding primitives
network topology
cyber physical systems
linear codes
network coding
encoding
telecommunication security
Payloads
software defined networking
telecommunication network topology
computer network
computer networks
delays
resilience
Decoding
composability
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »