Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fingerprinting
biblio
A novel approximate computing based security primitive for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT devices
Watermarking
ultra-low power design requirement
Three-dimensional displays
telecommunication security
telecommunication power management
security primitive
Resiliency
pubcrawl
Metrics
Lightweight Encryption
IoT security
approximate computing
Internet of Things
Internet infrastructure
information hiding approach
Human Factors
Human behavior
hardware security vulnerabilities
Fingerprinting
digital watermarking
device authentication
Cryptography
composability
biblio
Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection
Submitted by grigby1 on Mon, 09/11/2017 - 2:18pm
browser
Browser Security
canvas
Fingerprinting
Flash
Human behavior
privacy
pubcrawl
Resiliency
Scalability
tracking
biblio
Cypider: Building Community-based Cyber-defense Infrastructure for Android Malware Detection
Submitted by grigby1 on Mon, 03/20/2017 - 12:24pm
android
android encryption
collaboration
community detection
encryption
Fingerprinting
Human behavior
malware
Metrics
pubcrawl
Resiliency
Scalability
signature based defense
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
biblio
A Survey on Zero-Day Polymorphic Worm Detection Techniques
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
payload encryption
zero-day polymorphic worm detection techniques
zero-day malware
Zero-day attacks
Vectors
signature-based defenses
Signature Generation
security layers
Polymorphic worms
Payloads
detection systems
Monitoring
malware
key per infection
invasive software
Internet security
internet
Grippers
Fingerprinting
biblio
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
Submitted by BrandonB on Tue, 05/05/2015 - 9:33am
JPEG2000 coding
TSH transform
tree-structured Harr transform
Transforms
social networking (online)
Social network services
social network analysis
secure multimedia big data sharing
multimedia computing
Multimedia communication
media distribution protection
JPEG2000 compressed domain
Big Data
Image coding
hybrid multicast-unicast
Homomorphic encryption
hierarchical community structure
Fingerprinting
fingerprint code
encryption
Data protection
data compression
Cryptography
Communities
biblio
TTP-free asymmetric fingerprinting protocol based on client side embedding
Submitted by BrandonB on Mon, 05/04/2015 - 12:05pm
image watermarking
Watermarking
TTP-free asymmetric fingerprinting protocol
trusted third party
Trusted Computing
Table lookup
Servers
secure watermark embedding
scalability issues
Protocols
personalized decryption key distribution
nonblind decoding
Multimedia systems
multimedia content distribution
asymmetric protocols
Image coding
Fingerprinting
encryption
Decoding
customer rights
Cryptographic Protocols
client-side embedding technique
client-side embedding distribution framework
Client-side embedding
client-server systems
Buyer-Seller watermarking protocol
Buyer's fingerprint
binary fingerprint
biblio
Signal fingerprinting in cognitive wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
malicious attacks
wireless mesh networks
Wireless communication
wireless
telecommunication signalling
telecommunication security
spread spectrum communication
Signal to noise ratio
signal fingerprinting
security
RFF
public key cryptography
Public key
Protocols
active radiofrequency fingerprinting
Fingerprinting
DoS
denial-of-service attacks
Demodulation
Cryptographic Protocols
CRM
common-control-channel information
cognitive wireless networks
cognitive radio manager framework
cognitive radio
Cognitive
Amplitude shift keying
« first
‹ previous
1
2