Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Compositionality
biblio
Android Malware Detection Based on Heterogeneous Information Network with Cross-Layer Features
Submitted by grigby1 on Tue, 05/30/2023 - 3:18pm
Semantics
Internet of Things (IoT) Security
Heterogeneous information network (HIN)
Cross-layer features
Cross layer design
codes
Android Malware Detection
Media
operating systems
feature extraction
Compositionality
Java
composability
Cross Layer Security
Resiliency
resilience
pubcrawl
biblio
A Comparative Study on Machine Learning based Cross Layer Security in Internet of Things (IoT)
Submitted by grigby1 on Tue, 05/30/2023 - 3:17pm
composability
Cross layer design
Energy Efficiency
interoperability
Internet of Things
Scalability
renewable energy sources
wireless networks
Compositionality
computer architecture
Cross Layer Security
Protocols
privacy
Resiliency
resilience
pubcrawl
security
machine learning
biblio
Cross-Layer DoS Attack Detection Technique for Internet of Things
Submitted by grigby1 on Tue, 05/30/2023 - 3:17pm
Internet of Things
security
IoT
Intrusion Detection
pubcrawl
resilience
Resiliency
Cross Layer Security
composability
Compositionality
Routing protocols
DoS attack
neural network
Propagation losses
Cross layer design
Cross Layer IDS
biblio
A cross-layer attack path detection method for smart grid dynamics
Submitted by grigby1 on Tue, 05/30/2023 - 3:17pm
Smart Grids
forward-backward
cross-layer attack
bidirectional detection
Cross layer design
Power system dynamics
Physical layer
Smart Grid
Compositionality
Predictive models
real-time systems
composability
Computers
Cross Layer Security
Resiliency
resilience
pubcrawl
biblio
A timestamp-based covert data transmission method in Industrial Control System
Submitted by grigby1 on Fri, 05/19/2023 - 2:27pm
Compositionality
ICMP
Resiliency
data science
Iptables
covert channels
covert channel
Firewalls (computing)
resilience
security
Linux
Data Security
industrial control system
integrated circuits
industrial control
Protocols
Scalability
pubcrawl
biblio
Covert Channel Detection Methods
Submitted by grigby1 on Fri, 05/19/2023 - 2:27pm
security
pubcrawl
Software
Scalability
Protocols
Task Analysis
Compositionality
resilience
Firewalls (computing)
software reliability
timing
statistical analysis
covert channel
covert channels
Resiliency
V2X communication
biblio
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
security
pubcrawl
Scalability
quantum computing
computer security
Games
Information Flow
Compositionality
resilience
Quantum entanglement
channel capacity
covert channels
Resiliency
quantum information
biblio
Security Foundations for Application-Based Covert Communication Channels
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
resilience
privacy-enhancing technologies
censorship
and censorship
Resiliency
Security Foundations
Communication channels
anonymity
covert channels
security
Syntactics
Compositionality
cognition
Protocols
privacy
Scalability
pubcrawl
biblio
On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
covert channel
random hashing
MAC layer security
Downlink
6G
Resiliency
5G security
Media Access Protocol
Data Exfiltration
covert channels
security
machine-to-machine communications
resilience
Compositionality
Protocols
5G mobile communication
Scalability
performance evaluation
pubcrawl
biblio
Exploring Timing Covert Channel Performance over the IEEE 802.15.4
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
Compositionality
IEEE 802.15 Standard
Resiliency
Turning
Performance
covert channels
covert channel
timing
resilience
information security
Protocols
Scalability
Safety
performance evaluation
pubcrawl
IoT
security
Cyber-security
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »