Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Probes
biblio
Exploiting Input Sanitization for Regex Denial of Service
Submitted by grigby1 on Thu, 06/22/2023 - 4:14pm
Compositionality
ReDoS
algorithmic complexity attacks
Regular expressions
Resiliency
web security
Data Sanitization
denial of service
Empirical Software Engineering
usability
security
Probes
Libraries
composability
web services
Software
resilience
pubcrawl
Servers
biblio
IronMask: Versatile Verification of Masking Security
Submitted by grigby1 on Fri, 01/13/2023 - 12:49pm
Probes
standards
Silver
Side-channel security
Security by Default
security
Scalability
Resiliency
resilience
random probing model
pubcrawl
probing model
expandability
privacy
physical defaults
masking
lronMask
data structures
Composition
composability
complete verification
Benchmark testing
automatic verification
biblio
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
security
Software
pubcrawl
Scalability
Resiliency
Human behavior
Probes
side-channel attacks
Data mining
Multicore processing
computer architecture
ping-pong regulator
Regulators
side channel attacks
pattern locks
biblio
Multi-Attack Detection Using Forensics and Neural Network Based Prevention for Secure MANETs
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
MANET Attack Detection
telecommunication traffic
Routing
Resiliency
resilience
pubcrawl
Probes
neural network
Multi attacker
Metrics
manet attack prevention
MANET
IEEE 802.11 Standard
Fuzzy logic
Forensics
Forensic method
Ethernet
detection
delays
Compositionality
biblio
Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space
Submitted by aekwall on Tue, 08/17/2021 - 4:05pm
policy-based governance
ipv6 security
Velocity measurement
Terminology
network measurement
Hitlist
Buildings
Address Probing
IPv6
security
Probes
composability
Resiliency
Metrics
pubcrawl
quality of service
internet
biblio
Killing EM Side-Channel Leakage at its Source
Submitted by grigby1 on Thu, 05/20/2021 - 11:53am
Probes
white box cryptography
White-box modeling
Signature Suppression
Low-overhead countermeasure
Local lower metal routing
attenuation
Metals
EM Side-channel attack
pubcrawl
Switches
Routing
composability
Cryptography
Resiliency
resilience
Metrics
biblio
Cache side-channel attacks detection based on machine learning
Submitted by grigby1 on Thu, 05/13/2021 - 12:23pm
Scalability
Cache side-channel attack
random forests
Attack vectors
detection
Probes
side-channel attacks
Hardware performance counters
privacy
computer architecture
Resiliency
resilience
Human behavior
pubcrawl
Support vector machines
machine learning
Cloud Computing
biblio
DEPARA: Deep Attribution Graph for Deep Knowledge Transferability
Submitted by aekwall on Thu, 05/13/2021 - 11:49am
attribution
composability
Computational modeling
computer architecture
Data models
Dictionaries
feature extraction
Human behavior
Metrics
Probes
pubcrawl
Task Analysis
biblio
Network Fingerprinting: Routers under Attack
Submitted by aekwall on Mon, 05/03/2021 - 1:10pm
attack
connectivity
Ecosystems
Hardware
internet
IP networks
network fingerprinting
ping
Predictive Metrics
Probes
pubcrawl
Resiliency
Router Systems Security
security
Topology
Traceroute
biblio
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
tuning
White Box Security
Libraries
machine learning
model characteristics
Probes
pubcrawl
resilience
security
security of data
strategic probing
text analysis
text generation
text transformer
Training
Training data
learning (artificial intelligence)
white box
white box adversarial attacks
Black Box Attacks
composability
Metrics
Resiliency
adversarial attacks
architecture attribution
black box encryption
deep classifier
GPT-2
image based classifiers
image classification
Industries
1
2
3
4
5
6
next ›
last »