Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
defense
biblio
On the Large-Scale Traffic DDoS Threat of Space Backbone Network
Submitted by
grigby1
on Tue, 12/01/2020 - 12:46pm
Bandwidth
bandwidth resource
composability
Computer crime
computer network security
data communication
Data Transmission
DDoS
DDoS attackers
defense
denial-of-service attack
global coverage
ground networks
IDS
internet
intrusion detection system
large-scale traffic DDoS threat
pubcrawl
reflection
reflection amplification attack
reflection amplification attacks
resilience
Resiliency
satellite communication
satellite network
satellite networks
Satellites
service delivery
space backbone network
space communication links
Space vehicles
telecommunication traffic
terminal devices
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by
grigby1
on Fri, 09/11/2020 - 11:09am
computer architecture
Internet of Things
IoT
pubcrawl
Resiliency
computer network security
IoT devices
malicious actors
Computer crime
malware
invasive software
botnets
distributed denial of service attacks
Metrics
DDoS
Proposals
Cybersecurity
Compositionality
defense
architecture
botnet
computationally limited devices
defense proposals
IoT botnet architectures
biblio
Certified Robustness to Adversarial Examples with Differential Privacy
Submitted by
aekwall
on Mon, 04/20/2020 - 9:31am
Cryptography
data privacy
security
learning (artificial intelligence)
pubcrawl
Metrics
Robustness
standards
neural nets
Databases
Mathematical model
Measurement
Predictive models
differential privacy
deep neural networks
machine learning models
adversarial examples
Adversarial-Examples
certified defense
certified robustness
cryptographically-inspired privacy formalism
Deep-learning
defense
Google Inception network
ImageNet
machine-learning
norm-bounded attacks
PixelDP
Sophisticated Attacks
privacy models and measurement
biblio
Malware Evasion Attack and Defense
Submitted by
grigby1
on Tue, 02/18/2020 - 10:53am
adversarial example
adversarial examples
Adversarial Machine Learning
black-box attacks
composability
Data models
defense
defense approaches
Detectors
Evasion Attack
grey-box evasion attacks
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
malware detection systems
malware evasion attack
Metrics
ML classifier
ML-based malware detector
pattern classification
Perturbation methods
pubcrawl
resilience
Resiliency
security
Training
Training data
white box cryptography
White Box Security
white-box evasion attacks
file
Robustifying Machine Learning for Cyber-Physical Systems
Submitted by
Soumik Sarkar
on Thu, 01/16/2020 - 2:28pm. Contributor:
Soumik Sarkar
Robust machine learning
adversarial attacks
defense
CNN
Deep RL
Posters
1845969
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
biblio
Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy
Submitted by
willirn1
on Tue, 09/24/2019 - 2:08pm
Cognitive Security
Cognitive Security in Cyber
deception
defense
biblio
POSTER: Zero-Day Evasion Attack Analysis on Race Between Attack and Defense
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
resilience
pubcrawl
Metrics
Resiliency
composability
adversarial example
Adversarial training
deep neural network (dnn)
zero-day adversarial examples
Zero day attacks
defense
biblio
Evaluation of Apache Spot's Machine Learning Capabilities in an SDN/NFV Enabled Environment
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
Apache Spot
composability
decomposition
defense
latent Dirichlet allocation
machine learning
Metrics
network function virtualisation
Penetration Testing
pubcrawl
resilience
Resiliency
SHIELD Project
software defined networking
virtual machine security
Zero day attacks
biblio
Spatio-temporal Context Reduction: A Pointer-analysis-based Static Approach for Detecting Use-after-free Vulnerabilities
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
resilience
pubcrawl
Metrics
Resiliency
composability
bug detection
program analysis
use-after-free
Zero day attacks
defense
biblio
Multi-source Data Analysis and Evaluation of Machine Learning Techniques for SQL Injection Detection
Submitted by
grigby1
on Mon, 12/10/2018 - 10:39am
resilience
pubcrawl
Metrics
Resiliency
composability
machine learning
network intrusion detection
SQL injection
Zero day attacks
defense
1
2
3
4
next ›
last »