Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Payloads
biblio
Steganography and its Detection in JPEG Images Obtained with the "TRUNC" Quantizer
Submitted by grigby1 on Thu, 10/20/2022 - 4:22pm
Steganography
steganography detection
trunc quantizer
steganalysis
side-information
jpeg
Imaging
speech processing
discrete cosine transforms
pubcrawl
Transform coding
modulation
Signal processing algorithms
Payloads
composability
privacy
Metrics
biblio
A Novel Laplacian of Gaussian (LoG) and Chaotic Encryption Based Image Steganography Technique
Submitted by grigby1 on Thu, 10/20/2022 - 4:22pm
encryption
Logistics
pubcrawl
Metrics
privacy
composability
Payloads
Image edge detection
Biomedical imaging
Steganography
logistic map
Image Steganography
Edge Detection Technique
Laplacian of Gaussian (LoG)
random sequence
steganography detection
biblio
Evading Signature-Based Antivirus Software Using Custom Reverse Shell Exploit
Submitted by grigby1 on Tue, 04/19/2022 - 1:15pm
anti-virus
detection algorithms
Kali Linux
malware
Metasploit-Framework
Meterpreter
Msfvenom
Payloads
pubcrawl
resilience
Resiliency
reverse shell
Scalability
Servers
signature based defense
biblio
Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model
Submitted by aekwall on Tue, 04/19/2022 - 11:20am
security
Computational modeling
Resiliency
composability
Payloads
Phishing
pubcrawl
SQL injection
cyber attack
MLP
parsing
SQLIA
Structured Query Language
Tagged Patterns
tagging
Cross Layer Security
biblio
Analysis of Image Steganography Techniques for Different Image Format
Submitted by grigby1 on Fri, 04/01/2022 - 1:17pm
information management
steg analysis
Image Steganography
bit substitution
Secure File Sharing
LSB
MSB
Bars
distortion
security
Metrics
Payloads
composability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Lightweight Monitoring Scheme for Flooding DoS Attack Detection in Multi-Tenant MPSoCs
Submitted by grigby1 on Tue, 03/01/2022 - 4:20pm
composability
Floods
Integrated circuit modeling
Metrics
Monitoring
multiprocessing systems
network on chip security
network-on-chip
Payloads
pubcrawl
resilience
Resiliency
Scalability
Task Analysis
biblio
Vertical Composition and Sound Payload Abstraction for Stateful Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 12:29pm
Protocols
vertical composition
tools
Syntactics
stateful protocols
standards
security protocols
pubcrawl
protocol verification
collaboration
privacy
policy-based collaboration
Payloads
formal methods and verification
Cryptography
computer security
Compositionality
composability
biblio
Automatic Generation of Different Malware
Submitted by grigby1 on Mon, 02/07/2022 - 4:43pm
Payloads
mobil malware
malware static analysis
malware dynamic analysis
automated malware generation
software development management
Malware Analysis
malware dataset
sockets
malware
privacy
static analysis
programming
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Systematically Encoded Polynomial Codes to Detect and Mitigate High-Status-Number Attacks in Inter-Substation GOOSE Communications
Submitted by grigby1 on Mon, 10/04/2021 - 3:04pm
Metrics
Substations
substation automation
Resiliency
pubcrawl
power system security
Payloads
parity check codes
object oriented security
network security
multicast communications
Communication system security
message authentication
linear codes
information security
Industrial Communication
Generators
encoding
cyber-physical systems
Cryptography
composability
biblio
Defense Against on-Chip Trojans Enabling Traffic Analysis Attacks
Submitted by aekwall on Thu, 09/30/2021 - 11:43am
Trojan horses
Hardware
Routing
pubcrawl
Scalability
Metrics
Resiliency
traffic control
Payloads
simulated annealing
NoC
hardware trojan
obfuscation
Program processors
routineg
network on chip security
1
2
3
4
5
6
7
8
9
next ›
last »