Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Analytical models
biblio
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Air gaps
Analytical models
composability
Government
Human behavior
Human Factors
machine learning
malware
Metrics
pubcrawl
resilience
Resiliency
security
tools
usability
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
security of data
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Analytical models
Scalability
Computational modeling
Security analysis
Games
Cyber Attacks
advanced persistent threat
APT
threat detection
cyberattack
game theory
Markov processes
q-learning
advanced persistent threats
Dynamic Information Flow Tracking
DIFT-based defender
Limiting average reward criteria
multistage attacks
Rain
real-word attack dataset
refinable attack investigation framework
Stackelberg semiMarkov game
Stackelberg zero-sum semi-Markov games
two-time scale Q-learning algorithm
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
Analytical models
API
APIs
application programming interface
Compositionality
Cryptographic Protocols
Cryptography
Data models
error correction data
fingerprint identification
formal methods and verification
Hardware
hardware-based security
integrated circuit
integrated circuits
mutual authentication protocol
physical unclonable functions
Protocols
pubcrawl
PUF API
PUF-based protocols
pufs
resilience
Resiliency
Security Properties
security protocols
Tamarin prover
biblio
Behavior Modeling and Individual Recognition of Sonar Transmitter for Secure Communication in UASNs
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
Acoustic Fingerprints
Analytical models
behavior modeling
Class D power amplifier
composability
Computational modeling
feature extraction
fingerprint features
Human behavior
individual recognition
low-frequency radiation source
memory polynomial model
nonlinear model
power amplifier
power spectrum features
pubcrawl
radio frequency fingerprint
radio transmitters
received signal
resilience
Resiliency
secure communication
Sonar
Sonar equipment
sonar signal processing
sonar transmitter
specific emitter identification
specific emitter recognition
UASN
underwater acoustic communication
underwater acoustic sensor networks
Underwater vehicles
wireless sensor networks
biblio
Secure Federated Averaging Algorithm with Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:42pm
security of data
Scalability
Servers
data privacy
Data models
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
privacy
convergence
convergence rate
Prediction algorithms
Analytical models
client-server systems
differential privacy
Stochastic processes
gradient methods
distributed machine learning
Gaussian noise
federated learning
message exchange
stochastic gradient descent
algorithm communication efficiency
client sensitive information
convergence analysis
differential attacks
federating averaging algorithm
local model parameters
message obfuscation
Model averaging
secure FedAvg algorithm
secure federated averaging algorithm
biblio
Physical Layer Security in Vehicular Networks with Reconfigurable Intelligent Surfaces
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
ad hoc network
adjustable phase shift
Analytical models
average secrecy capacity
Buildings
Compositionality
dedicated energy source
Double-Rayleigh fading channels
fading channels
important paradigm
incident signal
Metrics
Monte Carlo methods
passive elements
physical layer security
pubcrawl
reconfigurable intelligent surface
reconfigurable intelligent surfaces
Relays
resilience
Resiliency
RIS cells
RIS technologies
RIS-based access point
RIS-based relay
RIS-based transmission
RIS-relay
secrecy capacity
security
Signal to noise ratio
smart radio environments
source power
telecommunication network reliability
telecommunication security
vehicle-to-vehicle communication
vehicular ad hoc networks
vehicular adhoc network
vehicular communications
vehicular network system models
wireless channels
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
Analytical models
Biological system modeling
control engineering computing
Cybersecurity
cybersecurity tool
foundational knowledge
Human behavior
Human Factors
modular two-pronged offensive tool
offensive tool
operating systems
operating systems (computers)
policy-based governance
preliminary state
pubcrawl
public domain software
Reconnaissance
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
ROS
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
biblio
Particle Swarm Optimization Algorithm with Variety Inertia Weights to Solve Unequal Area Facility Layout Problem
Submitted by aekwall on Mon, 12/14/2020 - 11:38am
Conferences
pubcrawl
composability
simulation
convergence
particle swarm optimisation
Swarm Intelligence
particle swarm optimization
particle swarm optimization algorithm
Production
Analytical models
computational complexity
Compositionality
Layout
Swarm intelligence algorithm
PSO algorithm
dynamic inertia weight
facilities layout
Inertia Weight
nonlinear inertia weight
NP-hard problem
UA-FLPP
unequal area facility layout problem
workshop area utilization
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
Analytical models
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
cyber-attacks
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
Malware Analysis
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
pubcrawl
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
biblio
Deep Android Malware Classification with API-Based Feature Graph
Submitted by grigby1 on Fri, 12/11/2020 - 1:33pm
Analytical models
Android (operating system)
Android malware
Android malware apps
Android malware classification
API features
API-based feature graph classification
application program interfaces
CNN-based classifier
deep learning
feature extraction
Feature Selection
graph theory
hand-refined API-based feature graph
Human behavior
invasive software
malware
Malware Analysis
malware apps
malware class
Mathematical model
Metrics
mobile computing
privacy
pubcrawl
resilience
Resiliency
security
Silicon
structure analysis
1
2
3
4
5
6
7
8
9
…
next ›
last »