Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Limiting
biblio
Efficient Split Counter Mode Encryption for NVM
Submitted by grigby1 on Thu, 05/05/2022 - 3:13pm
encryption
pubcrawl
resilience
Resiliency
Software
optimization
composability
Memory management
Performance analysis
cyber physical systems
cyber physical system security framework
Limiting
Nonvolatile memory
efficient encryption
biblio
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
Submitted by grigby1 on Tue, 04/12/2022 - 12:20pm
Limiting
tools
Static-Analysis
security
Resiliency
resilience
pubcrawl
privacy
Mobile Applications
composability
IoT
Human behavior
fuzzing
firmware-analysis
dynamic-analysis
Data Sanitization
Computer bugs
Compositionality
biblio
Resisting Distributed Backdoor Attacks in Federated Learning: A Dynamic Norm Clipping Approach
Submitted by grigby1 on Tue, 04/12/2022 - 12:19pm
Training data
dynamic norm clipping
distributed backdoor attacks
Limiting
Resists
Data Sanitization
federated learning
Collaborative Work
Distributed databases
Training
Compositionality
composability
Big Data
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Web Application for Prevention of Inference Attacks using Crowd Sourcing in Social Networks
Submitted by grigby1 on Tue, 04/12/2022 - 12:19pm
Compositionality
inference attacks
data loss
Adaptive based algorithms
Limiting
social networks
Data Sanitization
education
social networking (online)
Clustering algorithms
Peer-to-peer computing
Crowd Sourcing
Classification algorithms
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
QoE-aware Data Caching Optimization with Budget in Edge Computing
Submitted by grigby1 on Mon, 01/31/2022 - 5:42pm
edge computing
QoE aware data caching
multiple knapsack problem
Limiting
Costs
budget constraint
approximate algorithm
user experience
Web Caching
Servers
quality of experience
quality of service
web services
Scalability
Resiliency
resilience
Metrics
pubcrawl
biblio
IoT Standard Platform Architecture That Provides Defense against DDoS Attacks
Submitted by grigby1 on Tue, 01/11/2022 - 10:35am
OCF
zero trust
Time measurement
Scalability
Resiliency
resilience
pubcrawl
Protocols
performance evaluation
attack surface
Metrics
Limiting
IoT security
IoT network security
denial-of-service attack
DDoS Attack
Conferences
Computer hacking
biblio
Unveiling MIMETIC: Interpreting Deep Learning Traffic Classifiers via XAI Techniques
Submitted by grigby1 on Wed, 12/22/2021 - 12:54pm
deep learning
encrypted traffic
explainable artificial intelligence
internet
law enforcement
learning (artificial intelligence)
Limiting
Mobile Applications
Mobile handsets
Multimodal learning
pubcrawl
resilience
Resiliency
Scalability
Traffic classification
xai
biblio
SAM: The Sensitivity of Attribution Methods to Hyperparameters
Submitted by aekwall on Thu, 05/13/2021 - 11:49am
Human behavior
pubcrawl
composability
Metrics
Robustness
attribution
Noise measurement
Sensitivity
Heating systems
smoothing methods
Limiting
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
Vulnerability analysis and consequences of false data injection attack on power system state estimation
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
nonlinear system model
vulnerability detection
Vulnerability Analysis
state estimation
Resiliency
pubcrawl
power transmission lines
power system state estimation
power system security
physical line
optimization
AC state estimation
Metrics
Load modeling
Load flow
Limiting
Human behavior
FDI attack
false data injection attack
DC optimal power flow
Compositionality
bi-level optimization problem
1
2
next ›
last »