Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Payloads
biblio
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
MQTT implementation
Things devices
telecommunication security
Security by Default
Security analysis
scenario
Scalability
Resiliency
pubcrawl
Protocols
protocol
Ports (Computers)
Payloads
MQTT system
MQTT protocol
adequate security mechanism
MQTT communication protocol
MQTT
ISO
IoT system
IoT device
IoT developers
Internet of Things
data privacy
Cryptography
computer network security
communication protocols
authentication
attack
biblio
Practical Strategies for Content-Adaptive Batch Steganography and Pooled Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
Metrics
Training
testing
steganography detection
Steganography
statistical model
statistical analysis
single-image detector
pubcrawl
privacy
pooled steganalysis
Payloads
payload spreading strategy
optimal detection
omniscient Warden
Adaptation models
matched filters
matched filter
likelihood ratio test
image matching
image filtering
distortion
Detectors
content-adaptive batch steganography
content-adaptive additive embedding schemes
composability
Batch steganography
Additives
adaptive embedding
biblio
Combinational Hardware Trojan Detection Using Logic Implications
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
logical implications
valid logic implications
Trojan horses
trojan horse detection
security
Resiliency
resilience
pubcrawl
proof-of-concept demonstration
potential benefit
Payloads
combinational circuits
logic simulation
Logic gates
logic design
invasive software
Integrated circuit modeling
Hardware
cyber physical systems
composability
combinational hardware trojan detection
biblio
Hardware Trojan Detection through Information Flow Security Verification
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Payloads
untrusted vendors
Trusted Computing
trust-hub benchmarks
Trojan horses
trojan horse detection
time-to-market constraints
security
Resiliency
resilience
pubcrawl
automatic test pattern generation
IP networks
invasive software
intellectual property
information flow security verification
industrial property
Hardware Trojan detection framework
Hardware
cyber physical systems
composability
Benchmark testing
biblio
\#x003BC;DTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
resilience
Metrics
microcontrollers
payload size
Payloads
performance evaluation
Protocols
pubcrawl
public key cryptography
man-in-the-middle attacks
Resiliency
Routing
secp128r1
secp192r1
secp256r1
security layer
store-carry-forward principle
μDTNSec
digital signatures
Asymmetric Encryption
asymmetric signatures
bundle protocol specification
Compositionality
Contiki OS
Cryptographic Protocols
delay tolerant networks
delay-disruption-tolerant networks
advanced encryption standard
disruption-tolerant networks
Elliptic curve cryptography
encryption
energy measurement
energy measurements
energy-constrained devices
hardware-backed symmetric encryption
Human behavior
biblio
Mining Malware Command and Control Traces
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Human behavior
telecommunication traffic
security of data
Scalability
Resiliency
resilience
pubcrawl
Payloads
Pattern recognition
pattern classification
Metrics
malware threats
malware detection rates
malware
invasive software
advanced persistent threat
effective anomaly based detection technique
detecting botnets
Data mining
controller commands
control traces
control payloads
control channel
command and control systems
command and control
Classification algorithms
botnet
anomaly based detection
advanced persistent threats
biblio
Reasoning Crypto Ransomware Infection Vectors with Bayesian Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Infection Vector
uncertainty
Resiliency
resilience
Ransomware
pubcrawl
Payloads
Nickel
Metrics
malware
invasive software
Bayes methods
encryption
Cryptography
crypto ransomware infection vectors
crypto ransomware
conditional probability
composability
belief networks
Bayesian network statistics
Bayesian network
biblio
Detection and Prevention of Crypto-Ransomware
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
Elliptic curve cryptography
Servers
Resiliency
resilience
Ransomware
pubcrawl
Private-key cryptosystem ransomware
Payloads
Metrics
malware
file types
encryption
bitcoin
Electronic mail
Domain Generated Algorithm (DGA)
cybercriminals
Cryptography
Cryptographic Ransomware (CGR)
crypto-ransomware prevention
crypto-ransomware detection
Crypto-Ransomware
computer viruses
Computer crime
composability
biblio
Vehicle Network Security Testing
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
testing
Patterns
Payloads
Protocols
pubcrawl
resilience
Resiliency
security
security loophole
pattern decoding
V2V
V2V V2X loopholes
V2X
vehicle
vehicle network security testing
vehicular ad hoc networks
white box approach
White Box Encryption
gateway module security testing
black box approach
CAN
Communication networks
composability
computer network security
diagnostics security
ECU
Ethernet
authentication
gateway security
grey box approach
in-vehicle network security implementation
in-vehicle networks
internetworking
message authentication
Metrics
Network
biblio
Threats and surprises behind IPv6 extension headers
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
Metrics
telecommunication traffic
standards
security
Resiliency
quality of experience
pubcrawl
Protocols
Probes
Payloads
Monitoring
collaboration
legitimate traffic
ipv6 security
IPv6
IP networks
Internet threats
internet
extension headers
end-user QoE
computer network security
composability
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »