Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cloning
biblio
Defending Against Model Stealing Attacks With Adaptive Misinformation
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
Adaptation models
Adaptive Misinformation
Adversary Models
attacker
attacker clone model
black-box query access
clone model
Cloning
Computational modeling
Data models
deep neural networks
Human behavior
labeled dataset
learning (artificial intelligence)
Metrics
model stealing attacks
neural nets
OOD queries
out-of-distribution inputs
Perturbation methods
Predictive models
pubcrawl
query processing
resilience
Resiliency
Scalability
security
security of data
training dataset
biblio
Android gaming malware detection using system call analysis
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
Monitoring
pubcrawl
Metrics
Resiliency
composability
mobile computing
smart phones
Cloning
malware
invasive software
program diagnostics
dynamic analysis
Games
resilience
Androids
Humanoid robots
Android (operating system)
computer games
Android Gaming Malware
Android gaming malware detection system
Android operating systems
benign game system calls
cloning applications
detection system
malicious games
malicious gaming applications
malware game system calls
system call analysis
Operating systems security
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
computer network security
security
system monitoring
Resiliency
pubcrawl
composability
Production
privacy
threat intelligence
Measurement
sandboxing
cyber-physical systems
Containers
computer viruses
Switches
Degradation
Attack Strategies
Cloning
container-based microservice architectures
evaluation scenario
live confinement
network deception mechanisms
open production network
Production systems
QoD
quarantined services
sandbox network
sandnet
security incidents
suspicious microservices
vulnerable production network
confinement
biblio
Machine Learning Based IoT Edge Node Security Attack and Countermeasures
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
Cryptography
Internet of Things
security
Cloud Computing
Servers
computer network security
Protocols
authentication
computer architecture
machine learning
cloud server
pubcrawl
IoT networks
IoT
IoT devices
learning (artificial intelligence)
Human Factors
policy-based governance
authentic PUFs
cloned PUF devices
Cloning
cloning accuracy
highly connected ecosystem
IoT edge node security attack
machine-learning based countermeasure
malicious attack
malicious PUF modeling
noninvasive architecture independent machine learning attack
physically unclonable functions
PUF
PUF architecture
PUF designs
PUF structure
two-stage brute force attack model
ubiquitous computing devices
brute force attacks
biblio
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Scalability
encryption
malware
invasive software
mobile computing
feature extraction
Resiliency
Human behavior
pubcrawl
tools
Data mining
Android (operating system)
reverse engineering
Android ecosystem
Metrics
Code Obfuscation
Andorid app
Android app clones detection
class method
clone detection
Cloning
code obfuscation techniques
implicit intents
intent
malicious codes
method information
online markets
repackaged apps
android encryption
biblio
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
Asm2Vec
assembly clone search engine
assembly code representation learning model
assembly function
binary clone search
Binary-Code-Search
Cloning
code obfuscation techniques
compiler optimization options
composability
dynamic clone search approaches
feature engineering process
Human behavior
invasive software
learning (artificial intelligence)
lexical semantic relationships
malware
optimising compilers
optimization
optimizations
program assemblers
pubcrawl
Representation-Learning
resilience
Resiliency
reverse engineering
robust clone search engine
robust vector representation
search engines
search problems
Semantics
Software
static code analysis
static representation robustness
Static-Analysis
Syntactics
vector representation
Vectors
Vulnerability-Search
biblio
An Automated System Recovery Using BlockChain
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
automated system recovery
back-up procedures
block-chain
blockchain
Cloning
data integrity
disaster recoevry
disaster recovery system
DR system
duplicated file integrity
performance evaluation
pubcrawl
recovery performance evaluation
Registers
resilience
Resiliency
security of data
Servers
System recovery
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
static analysis
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
Libraries
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
call graph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
maximum common subgraph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
biblio
New clone-detection approach for RFID-based supply chains
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
authentication
back-end database
clone-detection approach
Cloning
counterfeit product injection detection
Databases
encoded local database
Human behavior
Human Factors
low-cost wireless method
Nonvolatile memory
NVM
pubcrawl
radio-frequency identification
radiofrequency identification
Resiliency
RFID
RFID monitoring schemes
RFID tag
RFID tags
RFID technology
RFID-based supply chains
RFIDs
security issues
Servers
supply chain partners
supply chains
tag tracing
telecommunication security
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Android (operating system)
Android source code
b-bit minwise hashing technique
clone-and-own reuse analysis
Cloning
component extraction
Cryptography
Data mining
Debian GNU package
Debian Linux package
directory names
efficient file similarity computation
file clone detection
Firefox source code
Information Reuse
origin analysis
pubcrawl
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
Software reuse
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
1
2
next ›
last »