Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
file servers
biblio
Detecting Malicious Web Requests Using an Enhanced TextCNN
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
security of data
Data models
Support vector machines
support vector machine
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
pattern classification
internet
text analysis
convolutional neural nets
convolutional neural networks
text classification
statistical analysis
file servers
Web servers
deep learning
Semantics
Uniform resource locators
Predictive Metrics
web security
deep learning models
convolutional neural network for text classification
Convolutional Neural Network for Text Classification (TextCNN)
HTTP Dataset CSIC 2010
malicious Web request detection
Malicious Web requests detection
support vector machine (SVM)
TextCNN
Transferable statistical features
Web attack detection
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
distributed denial of service
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
pubcrawl
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
open systems
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
machine learners
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
I-O Systems
i-o systems security
security
azalea unikernel file IO offload
file IO command
file IO result
file organisation
file server
file servers
file system
File systems
input-output programs
Io offload
Kernel
Libraries
Linux
Offloading
operating system kernels
operating systems
operating systems (computers)
pubcrawl
Scalability
software libraries
storage management
Telecommunications
unikernel
unikernel transfers
biblio
A Review on Self Destructing Data:Solution for Privacy Risks in OSNs
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
Cryptography
data deletion
data privacy
delays
Facebook
file servers
internet
online social network users
online social networks
OSN providers
OSN server
OSN user
privacy
privacy risks
privacy settings
privacy violations
pubcrawl
risk management
Scalability
security
security of data
security risks
self destructing data
Servers
social networking (online)
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 11:00am
Computer crime
computer network security
cyber threat landscape
Databases
deception based information security
deceptive counter measure abilities
deceptive defense strategies
delay strategies
delays
file servers
honeytokens
internet
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
reconnaissance process
resilience
Resiliency
robots
Scalability
security strategies
Web servers
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 9:45am
security of data
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
smart phones
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
apps
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
MTD
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
Outsourced Database Integrity
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Cloud Computing
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
file servers
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
protected volumes
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 9:34am
Amazon Echo
Amazon Echo enabled IoT home security system
BLE
Bluetooth
Bluetooth 4
bluetooth low energy
Cameras
composability
computer network security
expandability
file servers
Flowcharts
home automation
home computing
Home Security System
internet
Internet accessible configuration page
Internet of Things
Internet-connected system
IoT
pubcrawl
Resiliency
sensors
Smart Home
smart home environment
Speech recognition
ultralow-power wireless sensor network
user voice commands
Web server
wireless sensor networks
biblio
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot
Submitted by aekwall on Mon, 07/01/2019 - 9:11am
attacker behaviour evaluation
computer network security
Conferences
Data collection
file servers
honeypot
IDS
information collection
Kippo
metric
Metrics
network security
network security metric classification
pubcrawl
security
Security Metrics
software quality
software reliability
SSH honeypot-based system
statistical analysis
time 19.0 month
vulnerable server
biblio
Security system based on microcontrollers
Submitted by aekwall on Mon, 03/25/2019 - 8:57am
security
Monitoring
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Temperature sensors
microcontrollers
carbon monoxide level measurement
computerised instrumentation
development board Arduino
Ethernet interface
file servers
humidity measurement
Intelligent sensors
level measurement
Local area networks
magnetic contact
Magnetic field measurement
magnetic sensors
microcontroller
microsensors
movement detection measurement
process control
security system
sensor modules
single-chip microcontrollers
Smart Home
Temperature measurement
unauthorized entrance detection
Web server implementation
Web servers
sensor security
1
2
next ›
last »