Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
Implementing a real-time capable WPLS testbed for independent performance and security analyses
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
security
personal area networks
physical layer security
pubcrawl
real-time capable WPLS testbed
real-time systems
resilience
Resiliency
secret key rate estimation
Particle measurements
security analyses
security evaluations
telecommunication security
Wireless communication
Wireless Physical Layer Security
wireless sensor networks
WPLS research results
8-bit MCU 8051
off-the-shelf hardware
microcontrollers
Metrics
legitimate parties
key management
key extraction
Internet of Things
independent performance
IEEE 802.15.4 communication standard
generically multiple transceivers
Entropy
eavesdropper
Correlation
composability
Atmospheric measurements
biblio
A Control Flow Graph-Based Signature for Packer Identification
Submitted by grigby1 on Wed, 05/30/2018 - 4:05pm
malware
single signature
signature based defense
Scalability
Resiliency
resilience
Reliability
pubcrawl
packer identification
malware samples
malware detection
malware attacks
Malware Analysis
byte signatures
invasive software
Intel Security Labs
feature extraction
Entropy
Electronic mail
Cryptowall malware
Cryptography
control flow graph
computer security
CFG-based signatures
byte-string signatures
biblio
On-Chip Jitter Measurement for True Random Number Generators
Submitted by grigby1 on Thu, 05/24/2018 - 12:15pm
Delay lines
delays
Entropy
field programmable gate arrays
Human behavior
Jitter
Metrics
pubcrawl
random key generation
resilience
Resiliency
Ring oscillators
Scalability
security
biblio
A heuristic attack detection approach using the \#x201C;least weighted \#x201D; attributes for cyber security data
Submitted by K_Hooper on Wed, 05/09/2018 - 11:02am
learning (artificial intelligence)
telecommunication traffic
Support vector machines
Security Heuristics
Scalability
Resiliency
pubcrawl
pattern classification
network traffic data
network systems
network intrusion detection
machine-learning techniques
machine learning
least weighted attributes
Cloud Computing
Intrusion Detection
heuristic attack detection approach
Feature Selection
feature extraction
Entropy
dimensionality problem
dimensional reduction
Data mining
cyber security data
cyber security
computer network security
Computational modeling
cloud-based computer networks
biblio
IoT network monitor
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
router
Mirai Botnet
Monitoring
network data analysis
password
Ports (Computers)
privacy
pubcrawl
Raspberry Pi
Resiliency
IoT network monitor
Scalability
security
Security by Default
security vulnerability
sensitive personal information
telecommunication traffic
user-friendly interface
user interfaces
deep packet analysis
Anomaly Detection
Biomedical monitoring
botnet
botnet traffic detection
character strings
computer network security
connected devices
consumer home IoT networks
Android (operating system)
default device passwords
default passwords
Entropy
home networks
home network security
Internet of Things
invasive software
IoT device
biblio
On Sequential Selection of Attributes to Be Discretized for Authorship Attribution
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
Indexes
Training
stylometry
sequential selection
pubcrawl
pattern classification
naïve Bayes classifier
Naive Bayes
Metrics
merging
authorship attribution
Human behavior
forward sequential selection
Entropy
Electronic mail
discretization
data mining techniques
Data mining
computer science
Bayes methods
biblio
Network Attribute Selection, Classification and Accuracy (NASCA) Procedure for Intrusion Detection Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Metrics
Vulnerability
Vegetation
unwanted intrusion detection
statistical learning procedure
Scalability
Resiliency
resilience
pubcrawl
Protocols
network attribute selection classification and accuracy procedure
Network
NASCA procedure
NASCA
Adaptation models
Intrusion Detection
Human Factors
Human behavior
Hidden Markov models
four-stage intrusion detection method
Entropy
Data models
Cybersecurity
cyber security space
Cyber Dependencies
computer network security
Compositionality
biblio
A novel transition effect ring oscillator based true random number generator for a security SoC
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Metrics
true random number generator
transition effect ring oscillator
system-on-chip
security SoC
Ring oscillators
Resiliency
resilience
random number generator
random number generation
pubcrawl
Oscillators
Microelectronic Security
Stochastic Computing Security
Layout
Inverters
FPGA
field programmable gate arrays
entropy source
Entropy
delays
composability
CMOS ASIC process
balanced TERO TRNG
application specific integrated circuits
Altera Cyclone series FPGA platform
biblio
Review on Detection Techniques against DDoS Attacks on a Software-Defined Networking Controller
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
information and communication technologies
telecontrol
software-defined networking controller
software defined networking
SDN security
SDN controller
SDN
Resiliency
remotely controlled networks
pubcrawl
Protocols
Metrics
IP networks
internet
centralised control
Human behavior
Entropy
detection techniques
DDoS detection
DDoS Attacks
DDoS attack detection
control systems
computer network security
Computer crime
composability
Communication Systems
centralized controller
biblio
Network parameters applicable in detection of infrastructure level DDoS attacks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network packets
Traffic flow
telecommunication traffic
resource availability
Resiliency
pubcrawl
Protocols
Ports (Computers)
network security
Anomaly Detection
Metrics
IP networks
Human behavior
Entropy
Electronic mail
DDoS attack detection
Computer crime
composability
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »