Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Probes
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Remote Monitoring and Online Testing of Machine Tools for Fault Diagnosis and Maintenance Using MTComm in a Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 4:35pm
prognosis
maintenance engineering
manufacturers
manufacturing
manufacturing operations
Metrics
MTComm
performance evaluation
Policy Based Governance
Probes
product quality
product quality prediction
production engineering computing
maintenance
pubcrawl
remote monitoring
remote online testing
resilience
Resiliency
RESTful Web services
Scalability
Servers
testing
testing operations
web services
cyber-physical systems
cloud applications
Cloud based fault diagnosis
Cloud Computing
collaboration
component level
composability
condition monitoring
Conferences
CPMC
cyber physical manufacturing cloud
cyber-physical manufacturing cloud
Anomaly Detection
factory floor data
fault diagnosis
fault diagnosis system
heterogeneous machine tools
Human behavior
Human Factors
Internet scale communication method
Internet-scale Computing Security
machine health monitoring
machine tool communication
machine tools
biblio
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 12/01/2020 - 1:48pm
intrusion detection system
Robustness
Resiliency
resilience
pubcrawl
Probes
Perturbation methods
network security suite
network intrusion detection systems
ML-based IDS
ML models
malware
malicious network traffic
malicious intrusions
adversarial attacks thwarting
IDS
generative adversarial networks
gan
Gallium nitride
feature extraction
computer network security
composability
anomalous traffic
adversary
adversarial perturbations
adversarial ML attack
Adversarial Machine Learning
biblio
Enhancing Internet of Battle Things using Ultrasonic assisted Non-Destructive Testing (Technical solution)
Submitted by grigby1 on Tue, 11/17/2020 - 3:00pm
IoMT
ultrasonic waves
ultrasonic materials testing
ultrasonic based nondestructive testing
testing
smart things
Scalability
Resiliency
resilience
pubcrawl
Probes
network technology
military equipment
military computing
materials defect analysis
machine intelligence
Acoustics
IoBT NDT and Machine Intelligence
iobt
Internet of Things
Internet of Military of Things
Internet of Battle of Things
internet
Intelligent sensors
Inspection
information technology
Human Factors
embedded technology
embedded systems
defence industry
computer architecture
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
mobile devices security breaches
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
wireless LAN
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
computer network security
tracking
mobile radio
smart phones
Metrics
privacy
Mobile handsets
location privacy
pubcrawl
Human behavior
Resiliency
Protocols
IoT devices
Internet of Things
data privacy
Monitoring
biblio
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
Power Attacks
fully controlled access
generic attack
high resolution EM probes
high-performance implementation
localized electromagnetic attack
localized EM attacks
minimum traces to disclosure
permutation network
potent threat
fixed S-box
profiled attack
randomization results
Semiconductor device measurement
side-channel attacks
spatial randomization
state register byte
transient random value
black box encryption
AES
encryption
Information Leakage
pubcrawl
composability
Metrics
Resiliency
resilience
sensitive data
Registers
Cryptography
Probes
black-box model attack
countermeasures
dataflow
datapath components
dynamic random mapping
embedded cryptographic implementations
exploitable leakage
biblio
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
malware
BIOS Security
resource utilization consistency
Probes
heatmap training mechanism
Heating systems
flow graphs
defensive deception
decoy processes
decoy process
control flow graphs
neural network
Human Factors
Scalability
neural nets
Neural networks
learning (artificial intelligence)
Training
resilience
Resiliency
Metrics
pubcrawl
machine learning
resource management
resource allocation
invasive software
biblio
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Submitted by grigby1 on Fri, 08/28/2020 - 3:42pm
IITD database
Template Protection
secure systems
Scalability
Resiliency
resilience
Recognition accuracy
pubcrawl
Probes
privacy issues
permanent protection
Metrics
iris-coding
iris-biometric verification
Iris recognition
Image coding
biometric encryption
identification mode
Homomorphic encryption
Hamming distance
feature extraction
encryption domain scheme
encryption
early decision making strategy
Decision Making
Cryptography
computationally efficient application
computational overload
block-wise comparison
biometrics (access control)
biometric recognition systems
biblio
Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units
Submitted by aekwall on Mon, 07/20/2020 - 10:42am
Intelligent Transportation Systems
Vehicular security
Plugs
low cost CAN probe
electronic control units
defined analysis tools
controller area networks
car generation
CAN bus attacks
Brakes
autonomous vehicles
automotive control area network bus
attack scenarios
connected vehicles
automobiles
automotive electronics
controller area network security
Payloads
Engines
Probes
security protocols
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 12:01pm
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
« first
‹ previous
1
2
3
4
5
6
next ›
last »