Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
covert channels
biblio
A Study of Network Covert Channel Detection Based on Deep Learning
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
detection model
Training
security
Scalability
resilience
network covert channel detection
network covert channel
machine learning algorithms
machine learning
learning (artificial intelligence)
information security
feature extraction
algorithmic model
detection algorithms
deep learning model
deep learning algorithm
deep learning
Data models
covert channels
covert channel detection
computer network security
computer covert channel
Compositionality
complex covert channels
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
Tracking Private Browsing Sessions Using CPU-Based Covert Channels
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
Browser Security
Compositionality
covert channels
CPU
CSS
electromagnetic emanations
HTML5
Human behavior
JavaScript
Metrics
pubcrawl
resilience
Resiliency
Tor
user identification
Web Tracking
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree
biblio
Outsmarting Network Security with SDN Teleportation
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
network security
teleportation attacks
Teleportation
Switches
software-defined networking
software defined networking
Software
security policies
security
SDN teleportation
SDN
Scalability
Resiliency
pubcrawl
Backdoors
Malicious Switch
internet
intent-based networking
Heart
formally verifiable communication networks
design space
data plane
critical network functions
covert channels
control plane separation
computer network security
Compositionality
biblio
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Resiliency
vpn
Virtual private networks
uncontrolled networks
transport protocols
transport capacity
traffic pattern automatic adjustment
traffic normalization
Traffic analysis
telecommunication traffic
telecommunication network topology
telecommunication congestion control
TCP flows
Scalability
Bandwidth
rate-based congestion control mechanism
pubcrawl
Packet loss
overlay topology
overlay networks
network congestion avoidance
Logic gates
local network testbed
Cryptography
covert-channel-resistant congestion control
covert channels
Compositionality
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Covert communication with noncausal channel-state information at the transmitter
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
pubcrawl
Transmitters
transmitter
state-dependent channel
Scalability
Resiliency
Reliability
Receivers
radio transmitters
additive white Gaussian noise channels
noncausal channel-state information
Monte Carlo methods
encoding
discrete memoryless channels
covert communication
covert channels
Compositionality
AWGN channels
biblio
Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
fake key
un-detectability
telecommunication security
telecommunication channels
Servers
Scalability
Resiliency
pubcrawl
Protocols
message authentication
Heuristic algorithms
hashed message authentication code
generated un-detectability covert channel algorithm
advanced encryption standard
encryption
dynamically
dynamic secure communication
cryptography algorithms
Cryptography
covert channels
covert channel
confidentiality
Compositionality
authentication
Algorithm
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »