Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Keyboards
biblio
Perceptual Image Hashing Using Surffor Feature Extraction and Ensemble Classifier
Submitted by grigby1 on Mon, 03/14/2022 - 12:22pm
Policy Based Governance
surf features
Ensemble classifier
image hashing
Keyboards
Image coding
Resistance
Signal processing algorithms
Metrics
signal processing
Safe Coding
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
feature extraction
Computer hacking
biblio
Multi-Factor Authentication to Systems Login
Submitted by grigby1 on Wed, 03/09/2022 - 1:39pm
Knowledge engineering
shoulder surfing
screen capture
Retina
multi-factor authentication (MFA)
key logger
Graphical Password
a third-party authenticator (TPA)
ID
education
Keyboards
tools
Multi-factor authentication
multifactor authentication
Metrics
Hardware
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Study on Possibility of Estimating Smartphone Inputs from Tap Sounds
Submitted by grigby1 on Tue, 08/17/2021 - 4:18pm
Human behavior
Keyboards
keystroke analysis
Libraries
Mel frequency cepstral coefficient
Metrics
microphones
Pins
pubcrawl
side-channel attacks
Training data
biblio
OTDA: a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke Inference
Submitted by grigby1 on Tue, 08/17/2021 - 4:18pm
Measurement
video processing
Vibrations
security
pubcrawl
Optimal Transport
mobile sensing
mobile privacy
Metrics
Adaptation models
machine learning
keystroke analysis
Keyboards
Human behavior
feature extraction
domain adaption
Conferences
biblio
Analysis of USB Based Spying Method Using Arduino and Metasploit Framework in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
Software
peripheral interfaces
plug and play functionality
powershell
pubcrawl
resilience
Resiliency
reverse shell
reverse shell backdoor
operating systems (computers)
spying attacks
Universal Serial Bus
USB attack
USB device
Webcam
Webcams
Windows Operating System Security
Keyboards
security
Arduino
backdoor reverse shell
composability
computer network security
exploitation
Hardware
invasive software
Windows operating system
malware
Metasploit Framework
Metrics
microcontrollers
microphone device
operating system
operating systems
biblio
Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
Universal Serial Bus
powershell script
pubcrawl
resilience
Resiliency
security
security of data
Software
Turning
powershell
universal serial bus devices
USB
USB devices
user interfaces
Windows
Windows 10 operating system attacks
Windows operating system
Windows Operating System Security
keylogger
Arduino Pro Microdevice
composability
Firewalls (computing)
Hardware
internet
keyboard injection attack analysis
keyboard injection attack implementation
Keyboards
Arduino
keylogger program
keystroke analysis
Metrics
microcomputers
Microsoft Windows (operating systems)
operating systems
peripheral interfaces
biblio
Fidelius: Protecting User Secrets from Compromised Browsers
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
fully malicious environment
Browser Security
Keyboards
browser window
Browser-Security
client-side privacy measures
compromised browsers
credit card numbers
Fidelius
user interfaces
Hardware-enclave
Malware-protection
page load
Trusted-I/O
user interaction
user secret protection
web browsing sessions
security of data
operating systems (computers)
Compositionality
Browsers
side-channel attacks
malware
online front-ends
composability
sensitive data
data privacy
Hardware
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
Keyboards
BIOS Security
userspace keylogger detection
unprivileged keylogger detection
surveillance software
spyware
privileged
operating system kernels
monitoring software
malware packages
keystroke simulation
keystroke logger
Keylogger userspace
Kernel keylogger
confidential data stealing
authorisation
microsoft windows
Human Factors
Kernel
Computers
resilience
Resiliency
Metrics
pubcrawl
mobile computing
security
invasive software
Scalability
Monitoring
biblio
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
SwitchMan
pubcrawl
resilience
Resiliency
Scalability
secure protocol
secure user input
security
Servers
Switches
Protocols
usability
usability analysis
user I-O paths
user interfaces
user protected account
user regular account
user screen output
user-level APIs
user-level malware attacks
invasive software
automatic account switching
BIOS Security
computer architecture
computer security
Human Factors
I-O Systems
i-o systems security
information sharing
Input/Output Security
application program interfaces
Keyboards
Linux
mac
malware
Metrics
operating systems
operating systems (computers)
performance evaluation
personal computers
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
1
2
3
next ›
last »