Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
High Speed Device-Independent Quantum Random Number Generation without Detection Loophole
Submitted by grigby1 on Tue, 10/08/2019 - 4:44pm
probability
Toeplitz matrix hashing
statistical fluctuations
Scalability
Resiliency
resilience
random processes
random number generation
random key generation
Quantum entanglement
quantum cryptography
pubcrawl
Bell theorem
Photonics
Metrics
Human behavior
Fluctuations
final random bit rate
Entropy
entangled photons
device-independent quantum random number generation
detection-loophole free Bell test
detection loophole
bit rate 114.0 bit/s
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by grigby1 on Mon, 05/20/2019 - 4:29pm
information theoretic security
triangular game
security evaluator
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
Mathematical model
information theory
Ciphers
Human Factors
Human behavior
Games
game theory
Entropy
cryptosystem security
cryptosystem
Cryptography
composability
collaboration
biblio
FP -TESTER : Automated Testing of Browser Fingerprint Resilience
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Browser Security
testing toolkit
software tools
privacy leaks
FP-TESTER
browser vendors
browser tracking
browser fingerprint resilience
Automated Testing
Resiliency
Statistics
Sociology
program testing
Compositionality
privacy
Fingerprint recognition
Browser Fingerprinting
online front-ends
Entropy
Browsers
Metrics
Human behavior
pubcrawl
resilience
testing
security of data
data privacy
internet
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
biblio
Random Number Generator Based on Hydrogen Gas Sensor for Security Applications
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
petrochemical field
hydrogen gas sensor
II-VI semiconductor materials
microfabrication
microfabrication techniques
nanowires
NIST 800-22 statistical randomness test
nondeterministic noise
nuclear reactors
Hydrogen
random number generation
random number generator
security applications
security of industry applications
thermal noise
thermal noise information
Zinc oxide
sensor security
cryptographic applications
Resiliency
Human behavior
pubcrawl
composability
Metrics
Entropy
Generators
statistical analysis
Cryptography
entropy source
fuel cells
Gas detectors
gas sensor based RNG
gas sensors
hash function SHA-256
high-quality random number generator
biblio
Behavioral Based Trust Metrics and the Smart Grid
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
Smart Grid
pubcrawl
resilience
Resiliency
Routing
Scalability
security
security of data
service level strategies
power system security
smart power grids
statistical analysis
substation protection
Substations
telecommunication network routing
trust levels
trust measurements
Trusted Communications
learning (artificial intelligence)
behavioral pattern analysis
big data security
communication routing
critical components
electrical grid
Entropy
Grid Security
Grid Trust
behavioral based trust metrics
Mathematical model
Metrics
microsoft windows
Monitoring
network anomaly detection
network security
power engineering computing
biblio
An Empirical Study of Web Software Trustworthiness Measurement
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
internet
Web software trustworthiness measurement
web software
trustworthiness
Trusted Computing
security of data
pubcrawl
online accounting software
matrix algebra
Manganese
ISO/IEC 9126
ISO standards
automation
IEC standards
fuzzy set theory
fuzzy judgment matrix
factor analysis
evidence theory
evidence synthesis
Entropy
empirical analysis
confidence identification
composability
biblio
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Submitted by aekwall on Mon, 03/04/2019 - 10:48am
Entropy
Automated Response Actions
Trojan horses
timely defense decision making
Text Mining
Stanford typed dependency parser
rapid growth
publicly available CTI sources
NLP techniques
NLP
Mutual information
Malware behavior analysis
low-level cyber threat actions
information theory
extract threat actions
security of data
enabling timely response
cybersecurity texts
cyber threat intelligence sharing
cyber threat intelligence
Cyber Attacks
advance threat notice
ActionMiner
natural language processing
Data mining
Decision Making
Cybersecurity
composability
pubcrawl
Resiliency
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »