Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fingerprinting
biblio
Malware Family Fingerprinting Through Behavioral Analysis
Submitted by aekwall on Tue, 09/21/2021 - 11:07am
Informatics
Predictive Metrics
Malware Signature
malware detection
Fingerprinting
Fingerprint recognition
behavior analysis
Malware Analysis
dynamic analysis
security
malware
privacy
Human behavior
Resiliency
pubcrawl
Conferences
machine learning
biblio
Indoor Silent Object Localization using Ambient Acoustic Noise Fingerprinting
Submitted by grigby1 on Wed, 01/20/2021 - 4:07pm
localization
subtraction method
stationary sound sources
Silent object
signal denoising
Resiliency
resilience
pubcrawl
object position
noise signal
noise absorption characteristic
Noise
microphones
acoustic
lateral localization
indoor silent object localization
indoor radio
Indoor
Human behavior
Fingerprinting
composability
ambient acoustic noise fingerprinting
Acoustic signal processing
acoustic noise
Acoustic Fingerprints
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
biblio
Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
machine learning methods
integrated circuit modelling
integrated circuit testing
integrated circuits
Inverters
ip protection
IP/IC providers
learning (artificial intelligence)
Logic gates
machine learning
Integrated circuit modeling
Metrics
minimal design variations
modified netlist
pubcrawl
resilience
side-channel power analysis
supply chains
Trojan horses
fingerprinting scheme
policy-based governance
composability
IP piracy
Benchmark testing
circuit CAD
Computer crime
Cryptography
design-based fingerprinting
Fingerprinting
Resiliency
gate-level netlist changes
Hardware
Human behavior
Human Factors
IC design flow
IC piracy
industrial property
integrated circuit design
biblio
To Extend or Not to Extend: On the Uniqueness of Browser Extensions and Web Logins
Submitted by grigby1 on Wed, 01/16/2019 - 2:33pm
pubcrawl
Human behavior
Metrics
Resiliency
anonymity
Fingerprinting
uniqueness
Web Tracking
Web Browser Security
Compositionality
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
intrusion protection system
software heterogeneity
Servers
security
Resiliency
resilience
pubcrawl
Protocols
Probes
personal area networks
network technology
network security
Network scans
network scan
IoT devices
IoT
6LoWPAN
Internet of Things
internet
interconnectivity
IEEE 802.15 Standard
IEEE 802.11 Standard
heterogeneous IoT networks
hardware heterogeneity
Fingerprinting
Cyber Physical Systems Security
computer network security
composability
complex security protocols
Bandwidth
active network measurements
biblio
Fingerprinting non-numeric datasets using row association and pattern generation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
Pattern generation and row association schemes
internet
Metrics
Non-numeric datasets
nonnumeric digital data
original pattern
Outsourced Database Integrity
Ownership protection
ownership rights
pattern generation
Fingers
primary key
pubcrawl
relational data
relational databases
Resiliency
row association schemes
RSA encryption
Secret key
Watermarking
fake rows
business purposes
composability
Cryptography
data analysis
Decoding
digital rights protection
encryption
fake attributes
fake pattern
application environment
fast internet
Fibonacci series
fingerprint detection algorithm
fingerprint identification
Fingerprint recognition
fingerprint sequence
Fingerprinting
fingerprinting nonnumeric datasets
biblio
An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint
Submitted by K_Hooper on Wed, 01/10/2018 - 11:10am
Acoustic Fingerprints
composability
Fingerprinting
Flow-net
Human behavior
Intrusion Detection
pubcrawl
Resiliency
biblio
Physical-layer Fingerprinting of LoRa Devices Using Supervised and Zero-shot Learning
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
physical layer security
Acoustic Fingerprints
composability
Fingerprinting
Human behavior
lora
PHY layer
pubcrawl
Resiliency
biblio
Robust video fingerprints using positions of salient regions
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
visualization
visual fingerprint generation methods
visual feature extraction
video signal processing
video retrieval
video fingerprint
TRECVID datasets
Spectrogram
search algorithm
robust video fingerprinting system
Robustness
robust audio fingerprint extraction approach
Acoustic Fingerprints
pubcrawl
Human behavior
greyscale video images
graphics processing units
graphics processing unit
Fingerprint recognition
Fingerprinting
feature extraction
discrete cosine transforms
Content-based copy detection
composability
1
2
next ›
last »