Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Silicon
biblio
Behavioral Malware Detection in Delay Tolerant Networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
DTN model
Silicon
short-range communication technologies
proximity malware
polymorphic malware
obfuscated malware
naive Bayesian model
modern mobile consumer electronics
mobile radio
Mathematical model
malware
invasive software
filtering theory
Equations
adaptive look ahead
dogmatic filtering
delay-tolerant-network model
Delay-tolerant networks
delay tolerant networks
Bluetooth
behavioral malware characterization
behavioral characterization
Bayesian methods
Bayesian malware detection
Bayesian filtering
Bayes methods
aging
biblio
Morphing communications of Cyber-Physical Systems towards moving-target defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:18am
morphing communications
traffic analysis attacks
Time factors
thwarting traffic analysis attacks
telecommunication traffic
Silicon
security
reliable communication services
real-time systems
networking infrastructures
network sessions
moving-target defense
Algorithm design and analysis
long-range communication services
internet
inter-packet delays
Information systems
eavesdrop network traffic
delays
cyber-physical systems
CPSMorph traffic morphing algorithm
CPS traffic
computer network reliability
biblio
Security attack mitigation framework for the cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:17am
security guarantee
Markov processes
mean time to security failure
MTTSF cloud
privacy losses
private data security
resource consolidation
security
Security Administration
security attack mitigation framework
Markov model
security of data
Silicon
software products
software vulnerabilities
software vulnerability exploits
virtual machine
Virtual machining
virtualisation
virtualization technology
customer trust
attack mitigation plan
availability parameter
business data leaks
Cloud Computing
cloud resource manager
cloud service
Companies
confidentiality parameter
cross-channel attacks
attack graphs
enterprise cloud computing
enterprise cloud solutions
enterprise IT infrastructure
enterprise wide information processing system
hacking techniques
information technology
integrity parameter
markov chain
biblio
Exploring the potential for full-duplex in legacy LTE systems
Submitted by BrandonB on Tue, 05/05/2015 - 8:58am
Base stations
Cellular networks
Downlink
FD-LTE
Frequency conversion
full-duplex communications
interference suppression
Long Term Evolution
LTE systems
passive SI cancellation schemes
radio spectrum management
receiving antennas
self-interference suppression
Silicon
spectral efficiency
Uplink
biblio
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks
Submitted by BrandonB on Fri, 05/01/2015 - 6:59am
malware propagation model
WSN
wireless sensor networks
traditional epidemic theory
telecommunication security
telecommunication control
sleep mode
Silicon
sensor node characteristics
saddle-point
overall cost minimization
optimal dynamic strategy
optimal control problem
malware-defense differential game
malware propagation prevention
bang-bang control
Malware propagation
malware
invasive software
Grippers
Games
epidemic theory
Differential Games
differential game-based strategy
Differential game
differential equations
decision-making problem
control systems
bang-bang controls
biblio
A New Efficient and Secure POR Scheme Based on Network Coding
Submitted by BrandonB on Thu, 04/30/2015 - 1:35pm
dispersal code
Silicon
Servers
security of data
secure POR scheme
proof of retrievability
network coding-based POR
network coding
maintenance engineering
maintenance
local data storage
encoding
efficient POR scheme
Availability
Decoding
Data Security
data integrity
data confidentiality
data communication
data checking
data availability
cost reduction
corruption attack prevention
corruption attack
Cloud Computing
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 11:06am
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 11:06am
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
biblio
Characterizations and boundaries of security requirements patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 11:52am
Science of Security
security
Unified modeling language
SoS Lablet
Software systems
software engineering
software development life cycle
Silicon
security requirements patterns
security requirements
security of data
security aspects
boundaries
Science of Security
Patterns
Metrics
Human behavior
Guidelines
defining format
Context
CMU
characterizations
CMU
« first
‹ previous
1
2
3
4
5
6
7