Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Payloads
biblio
Effective Botnet Detection Through Neural Networks on Convolutional Features
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
invasive software
Training
telecommunication traffic
Servers
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Payloads
P2P botnet datasets
Neural networks
Network traffic classification
Metrics
machine learning
learning (artificial intelligence)
IP networks
botnet
internet
feedforward neural nets
feed-forward artificial neural network
feature extraction
DDoS Attacks
cybercrimes
convolutional neural networks
convolutional features
convolution
computer network security
Computer crime
Compositionality
botnets
botnet detection system
Botnet detection
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
biblio
A New Payload Partition Strategy in Color Image Steganography
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
Color
composability
Correlation
distortion
Gray-scale
Image color analysis
Image Steganography
Metrics
modification probabilities
payload partition
Payloads
privacy
pubcrawl
RGB channels
security
steganography detection
biblio
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
JWT
user authentication codes
two-factor authentication method
two-factor authentication
two factor authentication
TOTP-based two factor authentication scheme
TOTP
Servers
pubcrawl
private blockchain
Payloads
password
OTP tokens
membership service
JWT authentication method
additional time-based password
Hyperledger Fabric v1.0
Hyperledger Fabric v
hyperledger fabric blockchain
Hyperledger Fabric
Human Factors
Human behavior
Fabrics
Cryptography
Claim Token method
authorisation
authentication vulnerability
authentication servers
authentication
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
Programmable SoC platform for deep packet inspection using enhanced Boyer-Moore algorithm
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
SIMD
Program processors
Programmable SoC
pubcrawl
real-time on-line pattern search
real-time systems
resilience
Resiliency
Scalability
search problems
platform based design methodologies
string matching
system monitoring
system-on-chip
SystemC
TCP
TCP packets
Xilinx Zynq programmable SoC
Zynq
High-Le'vel Synthesis
Algorithm design and analysis
BM string search algorithm
Boyer-Moore
Boyer-Moore algorithm
computer network security
deep packet inspection
FPGA
Hardware
high level synthesis
Accelerator
high-level synthesis
Inspection
MISD parallelism
Network Monitoring
network security
parallel processing
Payloads
Platform Based Design
biblio
SIN2: Stealth infection on neural network \#x2014; A low-cost agile neural Trojan attack methodology
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
neural computing framework
Trojan horses
third-party cloud based machine learning as a service
static neural network model
software algorithm level
SIN2
security
Scalability
Runtime
Resiliency
resilience
pubcrawl
portable DNN computing engine
Payloads
Neural networks
neural nets
AI Poisoning
low-cost modular methodology-stealth infection on neural network
low-cost agile neural Trojan attack methodology
learning (artificial intelligence)
invasive software
Intelligent systems
intelligent supply chain
intelligent service supply chain
Human behavior
dynamic runtime system
DNN security
Deep Neural Network
Computational modeling
Cloud Computing
artificial intelligence industry
biblio
A red team blue team approach towards a secure processor design with hardware shadow stack
Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
private data access
Trusted Computing
software attacks
security of data
security
RISC-V
return oriented programming attack
Resiliency
resilience
reduced instruction set computing
red team blue team approach
pubcrawl
processor vulnerabilities
processor design security
processor architecture
composability
Payloads
openrisc
open processor architectures
object-oriented programming
object oriented security
Metrics
memory corruption
hardware-software codesign
hardware shadow stack
Hardware
embedded systems
embedded system security
Computer bugs
computer architecture
biblio
Optimized event notification in CAN through in-frame replies and Bloom filters
Submitted by el_wehby on Mon, 05/14/2018 - 2:27pm
event-driven systems
timing
real-time systems
protocol
Proposals
Payloads
optimized event notification
Media Access Protocol
in-frame replies
access protocols
Electronic mail
distributed medium access control mechanism
data structures
controller area networks
CAN XR
Bloom filters
asynchronous medium access control mechanism
1646317
biblio
Supporting security protocols on CAN-based networks
Submitted by el_wehby on Mon, 05/14/2018 - 2:27pm
Cryptographic Protocols
standards
shared key generation protocol
security protocols
security
Protocols
physical bus segregation
Payloads
Observers
network security
Electronic mail
arbitrary binary Boolean functions
controller area networks
Controller area network (CAN)
controller area network
computer network security
CAN-based networks
CAN-based automotive systems
CAN XR
CAN protocol security-oriented enhancements
CAN data-link layer
Boolean functions
1646317
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »