Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Computers
biblio
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Air gaps
air-gap
air-gapped internal network
air-gapped networks
Central Processing Unit
composability
Computers
cover channels
CPU utilization
Decoding
distributed magnetic covert channel
encoding
error statistics
Human behavior
Human Factors
Image coding
information embedding
invasive software
magnetic cover channel
Magnetic separation
Magnetometers
Metrics
prototype MagView
pubcrawl
resilience
Resiliency
secret data
sensitive information
transmitter computer
video coding
video decoding
video encoding
video frame type
video quality degradation
biblio
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives
Submitted by grigby1 on Mon, 01/25/2021 - 10:27am
acoustic
acoustic signal detection
acoustical characteristics
Acoustics
air gap
Air gaps
air-gapped environment
air-gapped networks
audioless air-gapped computers
CD-LEAK
composability
compromised computer
computer network security
computer speakers
Computers
covert acoustic signals
covert channels
data modulation
Demodulation
demodulation algorithms
digital versatile discs
Drives
exfiltration
Human behavior
Human Factors
internet
invasive software
loudspeakers
malware
Metrics
nearby Internet connected receiver
novel acoustic covert channel
optical drives
optical modulation
optical receivers
process sensitive information
pubcrawl
resilience
Resiliency
signal generation
smart phones
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
Scalability
data integrity
security
Resiliency
Human behavior
pubcrawl
tools
software engineering
static analysis
Computer bugs
statistical analysis
software security
vulnerability detection
Computers
cross-site scripting
XSS
Open Source Software
software vulnerabilities
CVSS
critical vulnerabilities
GitHub
injection vulnerabilities
open source
open source PHP applications
open source project owners
open source projects
PHP
project popularity
RIPS
scanning
software project
Software Vulnerability
static analysis vulnerability scanner
vulnerable project
Cross Site Scripting
biblio
Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain- Texts
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
encryption
telecommunication security
public key cryptography
pubcrawl
collaboration
eavesdropper
Law
Computers
Human Factors
policy-based governance
Brute Force Attack
Common Key Cryptosystem
common-key cryptographic communication
common-key cryptosystem
concrete encryption-decryption algorithm
cryptogram
decryption keys
fake plain-texts
fake plaintexts
fundamental methods
legal plaintext
security improvement
Software algorithms
brute force attacks
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 2:17pm
authorisation
Monitoring
Scalability
invasive software
security
mobile computing
pubcrawl
Metrics
Resiliency
resilience
Computers
Kernel
Human Factors
microsoft windows
Keyboards
confidential data stealing
Kernel keylogger
Keylogger userspace
keystroke logger
keystroke simulation
malware packages
monitoring software
operating system kernels
privileged
spyware
surveillance software
unprivileged keylogger detection
userspace keylogger detection
BIOS Security
biblio
Smart augmented reality glasses in cybersecurity and forensic education
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
privacy
Digital Forensics
pubcrawl
Human behavior
Scalability
Computers
computer security
resilience
computer science education
Forensics
Mobile handsets
augmented reality
computer aided instruction
teaching
characteristics of cybersecurity analysts
cybersecurity analysts
cybersecurity education
cybersecurity theories
discovery learning
education
experimental learning
forensic education
Glass
heads-up display devices
helmet mounted displays
high resolution optical head mounted display
learning experiences
learning gaps
learning solutions
smart augmented reality glasses
Smart Augmented-Reality Glasses
STEM
biblio
Voltage Based Authentication for Controller Area Networks with Reinforcement Learning
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
computer network security
authorisation
Internet of Things
computer architecture
Support vector machines
cyber-physical systems
learning (artificial intelligence)
Resiliency
pubcrawl
Neural networks
Reinforcement learning
machine learning
testing
Computers
controller area network security
controller area networks
electronic control units
authentication mode
CAN bus
ECU signals
linear regression
physical authentication scheme
spoofing attacks
spoofing model
biblio
Secret Sharing Schemes with Hidden Sets
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Analytical models
cloud providers
Computational modeling
Computers
cryptographic keys
Cryptographic Protocols
Cryptography
detect hidden sets
Human behavior
Human Factors
interpolation
malicious dealer
Metrics
multifactor authentication
polynomial
polynomials
Protocols
pubcrawl
resilience
Resiliency
set theory
Shamirs secret sharing scheme
telecommunication security
uniform distribution
biblio
Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour
Submitted by grigby1 on Fri, 04/10/2020 - 11:36am
Human Behavior and Cybersecurity
cognition
Computer crime
computer games
Computers
Electronic mail
Games
Gamification/Gamified approach
gamified approach
gaming prototype
heuristic knowledge
Human behavior
Human Factors
internet
Knowledge
knowledge attributes
observational knowledge
online identity theft attack
Phishing
phishing attack
phishing attacks
phishing threat avoidance behaviour
phishing threat prevention behaviour
pubcrawl
Self-Efficacy
social cognitive theory
structural knowledge
threat avoidance motivation
Threat avoidance motivation and behaviour
tools
Training
user self-efficacy
1
2
3
4
5
6
7
8
9
…
next ›
last »