Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
covert channels
biblio
Covert Communications in Packet Collision Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
sophisticated receiver
pubcrawl
random access MAC
random access system
Receivers
resilience
Resiliency
Scalability
security
slotted ALOHA
physical-layer models
telecommunication channels
telecommunication security
transmitted signal
transmitter Alice
unauthorized users
watchful adversary Willie
Willie's receiver
wireless system security
covert systems
achievable covert rates
channel capacity
channel coding
composability
Compositionality
Conferences
covert channels
covert communications
covert rate
access protocols
decision theory
Detectors
Measurement
medium-access control layer
Monitoring
packet collision channels
Physical layer
physical layer environment
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
machine learning methods
window sizes
Vectors
timing
telecommunication channels
TCPIP
Scalability
Resiliency
resilience
pubcrawl
Protocols
network steganography
composability
machine learning
Linux
learning (artificial intelligence)
information security
hidden data
feature extraction
data packets
covert timing channel
covert channels
computer network security
Compositionality
biblio
Covert Data Exfiltration Using Light and Power Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
Internet of Things
standard off-the-shelf smart bulbs
Scalability
RGB LED
Resiliency
resilience
pubcrawl
Power covert channels
power channels
Optical covert channels
myriad security risks
light emitting diodes
IoT
Air gapped networks
free-space optical communication
exfiltration attacks
embedded security
Data Exfiltration
covert data exfiltration
covert channels
covert channel communications
computer network security
Compositionality
composability
Bluetooth controlled light bulb
Bluetooth
biblio
Towards Distributed Network Covert Channels Detection Using Data Mining-Based Approach
Submitted by grigby1 on Thu, 09/05/2019 - 11:26am
Compositionality
covert channels
data hiding
Data mining
Information hiding
resilience
Scalability
biblio
Towards Utilization of Covert Channels As a Green Networking Technique
Submitted by grigby1 on Thu, 09/05/2019 - 11:26am
Compositionality
covert channels
green networking
Information hiding
network covert channel
resilience
Scalability
Steganography
biblio
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Compositionality
Countermeasure Variation
covert channels
data leakage prevention
Information hiding
network security
Patterns
resilience
Scalability
Steganography
biblio
Cashing in on the File-System Cache
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Compositionality
covert channels
file system caches
resilience
Scalability
side channels
biblio
Covert Communication Under Channel Uncertainty and Noise Uncertainty
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
low probability of detection communication
user privacy protection
uncertainty
Throughput
telecommunication security
signal transmission
Signal to noise ratio
Scalability
resilience
receive SNR
Rayleigh fading channel
Rayleigh channels
Probability density function
noise uncertainty
noise power
average probability
Gain
fading channels
error statistics
eavesdropper
Data protection
covert throughput loss
covert throughput gain
covert communication
covert channels
Compositionality
channel uncertainty
channel gain
Channel estimation
average probability of detection error
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Studied on Application of Double Encryption Algorithm in Covert Channel Transmission
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
intelligent mobile terminal
Transportation
transmission process
telecommunication security
symmetric encryption
smart cities
Security transmission
Scalability
RSA
resilience
mobile terminal data transmission
mobile intelligent terminal
mobile computing
asymmetric encryption algorithm
file transfer
double encryption algorithm
Double encryption
DES
Cryptography
covert transmission
covert channels
covert channel transmission
covert channel
Conferences
Compositionality
Big Data
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »