Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Search Projects
Click a term to initiate a search.
Keywords
abusive surveillance
(1)
accelerators
(1)
accountability
(1)
active indicators
(1)
Agile information sharing
(1)
Airborne Networking
(1)
Algorithms
(1)
Analyse how user workload impacts the effectiveness of social engineering attacks
(1)
android
(1)
anonymity
(2)
anonymous credentials
(1)
anticipatory/proactive/dynamic cyberdefence
(1)
attack analysis
(1)
Attack Modeling
(1)
attacker social networks
(1)
attacks
(1)
auditing
(1)
authenticated encryption
(1)
authentication
(1)
automated checking
(1)
automated proof
(1)
automotive control systems
(1)
autonomous
(2)
BGP
(1)
Big Data
(3)
big data security
(1)
bridge
(1)
Brute-force Attack
(1)
censorship
(1)
censorship and information control
(1)
censorship circumvention
(1)
certifiable
(1)
certificate authority
(1)
citizen science
(1)
civil infrastructure
(1)
Cloud Computing
(4)
Cloud Security
(1)
cognitive science and cybersecurity education
(1)
Collective Privacy
(1)
collision avoidance
(1)
Communications
(1)
composability
(2)
Confidentiality in remote/outsourced computation
(1)
connected vehicles
(1)
construction management
(1)
contextual integrity
(1)
Correct-by-Construction
(1)
CPS Privacy
(5)
CPS Safety
(8)
CPS Security
(14)
CPU Cache Side Channels
(1)
cryptographic protection of private information during computation
(1)
Cryptography
(1)
curriculum transformation
(1)
cyber attack modeling and simulation
(1)
cyber physical systems
(1)
cyber trust
(1)
Cyber-security
(2)
Cybersecurity
(1)
Cybersecurity Competitions
(1)
cybersecurity education
(8)
data encryption
(1)
datasets
(1)
Decentralized Control
(1)
deception
(1)
delay
(1)
design of hash functions and block ciphers
(1)
detecting and predicting countermeasure
(1)
determine and evaluate potential for harassment to reduce harm to users
(1)
Develop approaches for integrity verification of multimedia objects
(1)
Developing New Capabilities
(1)
Developing secure specifications
(1)
differential privacy
(3)
digital storage technologies
(1)
discrimination
(1)
DNN
(1)
Drone
(1)
Education for Underrepresented Groups
(1)
Educational tools
(1)
Emergency Response
(1)
emerging digital finance
(1)
encryption
(2)
Enhance safe user behaviors
(1)
Equipment operation
(1)
evasion
(1)
Event/threat dectetion
(1)
eye movements
(1)
eye tracking
(1)
fingerprints
(1)
Forensics
(1)
FPGA
(1)
Governance Structure
(1)
GPUs
(1)
Graphics Buffers
(1)
Green building
(1)
h-CPS
(3)
hard problems trust
(1)
hardware accelerated security
(1)
Hardware Security
(5)
Hardware verification
(1)
hardware-software intrusion detection
(1)
Healthcare
(1)
hiring
(1)
hosting private data on third-party hosting providers
(1)
Human behavior
(1)
imperfect randomness
(1)
Improve management of today's security systems
(1)
Improving Security through More Usable Libraries and Languages
(1)
improving the web's public key infrastructure
(1)
information control
(1)
information flow security
(1)
Information theoretic limits
(1)
Insider Threats
(1)
integrity
(1)
Internet blackouts
(1)
internet censorship
(1)
Internet measurement in support of tools for privacy preservation and censorship circumvention
(1)
Internet of Things
(6)
Internet of Things (IoT)
(7)
Internet outages
(1)
inudstrial automation
(1)
IoT
(4)
JML
(1)
key management
(1)
knowledge integration
(1)
Lablets
(1)
leakage-resilient cryptography
(1)
legal and policy implications
(1)
Licensed and Unlicensed Spectrum
(1)
LMIs
(1)
Making sure the algorithms that provide the privacy are based on firm foundations and mathematical assumptions
(1)
malvertising
(1)
Malware Analysis
(1)
malware detection
(1)
malware infrastructure
(1)
MATLAB
(1)
Measurement
(2)
medical devices
(1)
Metrics
(2)
mhealth
(1)
MI-based underwater communication
(1)
Micro-robotics
(1)
misdirection
(1)
missingPI
(1)
mobile
(1)
mobile computing
(1)
mobile privacy; protocol analysis; online tracking
(1)
model-based design
(1)
modeling and simulation
(1)
Modularity
(1)
Moving Target
(1)
moving target defense
(2)
moving target defense; cyber agility
(1)
MPSoC
(1)
Multi-Path TCP
(1)
multi-UAV system
(1)
Nation-state censorship
(1)
Network
(1)
network functions virtualization
(1)
network science
(1)
Network Side Channels
(2)
network-on-chip
(1)
Online behavior modification
(1)
online data
(1)
Online games and gamification
(1)
optimization
(2)
passivity-based design
(1)
patch validation
(1)
perception
(1)
Phishing
(1)
Physical Unclonable Function
(1)
platforms
(1)
power grid cybersecurity
(1)
privacy
(3)
privacy assistants
(1)
privacy research dissemination
(1)
privacy vs access control tradeoff
(1)
privacy-preserving measurement
(1)
protocol
(2)
provable security
(1)
Providing anonymous communication
(1)
Public-key cryptography and mathematics
(1)
Radiation therapy
(1)
real time IC protection
(1)
Rensselaer Polytechnic Institute
(1)
reputation systems
(1)
resilience
(1)
Resiliency
(1)
Robotic fish
(1)
robotics
(1)
robust
(1)
Robust hardware-software intrusion detection
(1)
routing security
(1)
sampled data
(1)
Scalability
(2)
secure cloud
(1)
secure data analytics
(1)
Secure Hardware
(1)
secure multiparty computation
(1)
secure programming
(3)
secure provenance
(1)
Securing CPS
(1)
security
(12)
security analytics
(1)
security for vulnerable populations
(1)
Security in the presence of concurrent interactions
(1)
Sensory channel threats
(1)
Sensory Side-Channels
(1)
Side channels; SGX; model checking
(1)
side-channel attacks
(2)
simulation
(1)
smart and connected communities
(1)
smart cities
(1)
Smartphones
(1)
Social engineering attack
(1)
Social Welfare
(1)
Software correctness
(1)
software defined networking
(1)
software defined policies
(1)
Software Keyboard
(1)
software security
(1)
SoS-VO
(1)
source seeking
(1)
Spear Phishing
(1)
specification
(1)
State University of New York at Buffalo
(1)
statistical modeling
(1)
stochastic dense networks
(1)
suspicion
(1)
swarm
(1)
swarming CPS
(1)
system integration
(1)
systems engineering
(1)
TCP
(1)
telephony authentication
(1)
testbed
(1)
traffic hijacking
(1)
Trojan detection
(1)
trust
(1)
uav
(2)
UAVs
(2)
undergraduate cybersecurity education
(1)
Understanding the attack surface of privacy preserving technologies
(1)
underwater sensing
(1)
universal composability
(1)
Unmanned Aerial Vehicles
(2)
unmanned air vehicles (UAVs)
(1)
usability
(1)
usable security and privacy
(1)
Use quantum mechanics for information security
(1)
utility
(1)
vehicle
(1)
verifiability
(1)
verifiable computation
(1)
Verifiable hardware
(1)
voting
(1)
vulnerabilities
(1)
waves
(1)
wearable computing
(1)
Wichita State University
(1)
wireless charging
(1)
wireless networks
(1)
Sort by:
Count
|
Term