Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Electronic mail
biblio
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
Submitted by aekwall on Mon, 03/18/2019 - 8:53am
key sizes
black box encryption
quantum random oracle models
quantum cryptography
quantum computing
public key cryptography
Public key
postquantum security
post-quantum cryptographic schemes
post-quantum cryptographic primitives
post quantum cryptography
module lattices
Learning with errors
Lattices
key-establishment protocols
key-encapsulation mechanism
digital signature
key encapsulation
CRYSTALS - Kyber
CPA-secure public-key encryption scheme
ciphertext sizes
CCA-secure module-lattice-based KEM
CCA-secure KEM
authenticated-key-exchange schemes
Metrics
composability
pubcrawl
Resiliency
Electronic mail
Protocols
Cryptographic Protocols
encryption
biblio
A Decision Matrix Model to Identify and Evaluate APT Vulnerabilities at the User Plane
Submitted by grigby1 on Fri, 03/15/2019 - 10:52am
Mobile handsets
Workstations
user plane
threat vectors
threat attributes
threat
Spear Phishing
security
pubcrawl
privacy
Phishing
Organizations
organizational user
organizational information systems
multiple APT threat vector scenarios
advanced persistent threat vectors
Metrics
malware prevention
malicious APT vector
invasive software
genuine communication
fraudulent communication
Email
Electronic mail
cyber-security defensive mechanisms
Computer crime
APT vulnerabilities
APT threat vector
APT decision matrix model
APT
biblio
An Energy-Efficient Stochastic Computational Deep Belief Network
Submitted by grigby1 on Wed, 03/06/2019 - 3:29pm
random number generation
high energy consumption
Human behavior
learning (artificial intelligence)
Metrics
neural nets
Neurons
nonlinearly separable patterns
pattern classification
policy-based governance
pubcrawl
Hardware
random number generators
rectifier linear unit
resilience
Resiliency
RNGs
SC-DBN design
Scalability
Stochastic computing
Stochastic processes
DNNs
belief networks
Biological neural networks
Cognitive Computing
collaboration
composability
computation speed
Correlation
Deep Belief Network
deep neural networks
approximate SC activation unit
effective machine learning models
Electronic mail
energy consumption
energy-efficient deep belief network
energy-efficient stochastic computational deep belief network
fixed point arithmetic
fixed-point implementation
floating point arithmetic
floating-point design
biblio
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
regression analysis
machine learning techniques
Metrics
mobile phone
Naive Bayes
naïve Bayes classifier
pattern classification
pre-processed data
privacy
pubcrawl
Python
machine learning model
security
social computing
social media
social networking (online)
text analysis
text classification
Training
tweets authorship
Twitter
Twitter account
fake news
attribution
authorisation
authorship attribution
authorship attribution techniques
Bayes methods
classification
composability
digital identities
dubious sources
Electronic mail
anonymity
feature extraction
feature vector
Human behavior
human-in-the-loop security center paradigm
learning (artificial intelligence)
logistic regression
logistic regression based classifier
Logistics
machine learning
biblio
Cyber-Attack Reconstruction via Sliding Mode Differentiation and Sparse Recovery Algorithm: Electrical Power Networks Application
Submitted by grigby1 on Thu, 02/14/2019 - 10:23am
pubcrawl
variable structure systems
System recovery
sparse recovery algorithm
sliding mode differentiation techniques
Sensor Systems
security of data
security
Resiliency
resilience
actuators
power systems
power system control
Generators
Electronic mail
electrical power networks application
Electric Power System
cyber-physical systems
cyber-attack reconstruction
biblio
Email-Based Password Recovery - Risking or Rescuing Users?
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
resilience
Web sites
web services
user instructions
user authentication
usability
Unsolicited electronic mail
telecommunication security
System recovery
shared secret
security problem
secret passwords
secret link
Resiliency
authentication
pubcrawl
password recovery email
password recovery
password
message authentication
entire user-website relationship
English language websites
email-based password recovery
email content
Electronic mail
content issues
content and design of email-based password recovery
authorisation
biblio
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks
Submitted by aekwall on Wed, 02/13/2019 - 11:02am
learning (artificial intelligence)
Support vector machines
support vector machine
Servers
security of data
Scalability
Resiliency
Random Forest
pubcrawl
privacy leakage
principal component analysis
machine learning-based detection methods
machine learning algorithms
machine learning
Attack vectors
Human behavior
Feature Selection
feature extraction
Electronic mail
early detection
distributed cyber attacks
denial of services
DDoS Attacks
data privacy
cyberattack
cyber security community
Command & Control communication
C&C communication
biblio
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
network-based intrusion systems
execution sequences
fileless malware
host based intrusion detection system
installed applications
lightweight host-based intrusion detection system
malicious activities
malicious e-mail attachments
management tools
network administrators
enterprise networks
OS vendors
PowerShell process
process generation patterns
process information
serious social problem
Spreadsheet programs
system constructs process trees
targeting organizations
XML
microsoft windows
tools
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
drive-by-download attacks
Intrusion Detection
security of data
Organizations
advanced persistent threat
advanced persistent threats
active processes
anomaly processes
anti-virus software
computer viruses
Electronic mail
biblio
Edge Caching for Enriched Notifications Delivery in Big Active Data
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
caching policies
TTL caching
TTL based caching
Publish-subscribe
pattern clustering
notifications delivery
notification delivery
eviction-based caching
end users
edge caching
distributed broker nodes
declarative subscriptions
data management paradigm
data items
computer science
caching strategies
Big Data
bigdata publish-subscribe system
big active data systems
Big active data
BAD system
backend data cluster
Web Caching
cache storage
Distributed databases
Electronic mail
Task Analysis
Scalability
Resiliency
Metrics
pubcrawl
biblio
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Submitted by grigby1 on Wed, 01/16/2019 - 1:32pm
Servers
online front-ends
party developers
payment frauds
Phishing
popular browser
pubcrawl
Resiliency
security of data
Metrics
spying
traditional functionalities
Uniform resource locators
unsolicited e-mail
Videos
Web Browser Security
Web pages
affiliate fraud
malicious browser extensions
malicious browser extension
internet
Human behavior
Google Chrome
fraud
Electronic mail
current browsers
Computer crime
Compositionality
Browsers
browser extension platform
browser extension
attacks
attack possibilities
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »