Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristic algorithms
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
biblio
Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
energy consumption
Location Privacy in Wireless Networks
source node localization
source location privacy
protection mechanism
k disjoint paths
intermediate node selection
Energy-efficiency
dynamic and disjoint routing mechanism
DDRM
back-tracing attack
source location privacy protection
Position measurement
WSN
Compositionality
Monitoring
Heuristic algorithms
telecommunication network routing
Metrics
Routing
privacy
graph theory
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Metrics
Location Privacy in Wireless Networks
source-location privacy
dynamic mix-ring
Position measurement
Wireless communications
WSNs
routing algorithm
Compositionality
Heuristic algorithms
statistical analysis
Monitoring
Routing
privacy
wireless sensor networks
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
provably-correct distributed state estimation algorithm
trusted nodes
Trusted Computing
state estimation
set theory
sensors
security
Scalability
Robustness
resilient distributed state estimation
Resiliency
resilience
Redundancy
pubcrawl
attack-prone environment
NP-hard
Measurement
LTI systems
Linear systems
linear dynamical process
Human Factors
Heuristic algorithms
computer theory
computer network security
computational complexity
communication-link augmentation
attack-resilient algorithm
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
Research on Node Routing Security Scheme Based on Dynamic Reputation Value in Content Centric Networks
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
security issues
Dynamic Networks and Security
routing advantages
normal user requests
node routing security scheme
node routing attacks
dynamic reputation value
defensing
content centric networks
CCN network
Gold
Law
computer network security
Heuristic algorithms
telecommunication network routing
internet
Metrics
Routing
composability
pubcrawl
Resiliency
security
Servers
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
radio networks
White spaces
volatile operating environment
volatile environment
telecommunication security
security issues
security
Scalability
RL parameters
RL model
resource management
Resiliency
resilience
reinforcement learning model
Reinforcement learning
attacks
pubcrawl
pattern clustering
operating region
network scalability
learning rate
learning (artificial intelligence)
launch attacks
Heuristic algorithms
distributed cognitive radio networks
discount factor
Cognitive Radio Security
cognitive radio
clustering scheme
clustering
biblio
Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
mobile ad hoc network
Vectors
telecommunication network routing
Scalability
routing attacks
Routing
risk aware response technique
risk aware response mechanism
risk aware
Resiliency
resilience
pubcrawl
Mobile handsets
mobile devices
mobile ad hoc networks
Aerospace electronics
minimisation
MANET
Intrusion Response
Human behavior
Heuristic algorithms
DSDV algorithm
Dijkstra shortest path algorithm
destination sequenced distance vector algorithm
Destination sequenced Distance Vector
Conferences
computer science
centralized base point
black hole attack minimization
Attack vectors
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »