Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Probes
biblio
IronMask: Versatile Verification of Masking Security
Submitted by grigby1 on Fri, 01/13/2023 - 12:49pm
Security by Default
Side-channel security
random probing model
probing model
physical defaults
masking
lronMask
Composition
complete verification
automatic verification
Silver
resilience
Probes
data structures
Benchmark testing
standards
privacy
Scalability
Resiliency
security
pubcrawl
biblio
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
security
Software
pubcrawl
Scalability
Resiliency
Human behavior
Probes
side-channel attacks
Data mining
Multicore processing
computer architecture
ping-pong regulator
Regulators
side channel attacks
pattern locks
biblio
Multi-Attack Detection Using Forensics and Neural Network Based Prevention for Secure MANETs
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
MANET Attack Detection
telecommunication traffic
Routing
Resiliency
resilience
pubcrawl
Probes
neural network
Multi attacker
Metrics
manet attack prevention
MANET
IEEE 802.11 Standard
Fuzzy logic
Forensics
Forensic method
Ethernet
detection
delays
Compositionality
biblio
Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space
Submitted by aekwall on Tue, 08/17/2021 - 4:05pm
policy-based governance
ipv6 security
Velocity measurement
Terminology
network measurement
Hitlist
Buildings
Address Probing
IPv6
security
Probes
composability
Resiliency
Metrics
pubcrawl
quality of service
internet
biblio
Killing EM Side-Channel Leakage at its Source
Submitted by grigby1 on Thu, 05/20/2021 - 11:53am
Probes
white box cryptography
White-box modeling
Signature Suppression
Low-overhead countermeasure
Local lower metal routing
attenuation
Metals
EM Side-channel attack
pubcrawl
Switches
Routing
composability
Cryptography
Resiliency
resilience
Metrics
biblio
Cache side-channel attacks detection based on machine learning
Submitted by grigby1 on Thu, 05/13/2021 - 12:23pm
Scalability
Cache side-channel attack
random forests
Attack vectors
detection
Probes
side-channel attacks
Hardware performance counters
privacy
computer architecture
Resiliency
resilience
Human behavior
pubcrawl
Support vector machines
machine learning
Cloud Computing
biblio
DEPARA: Deep Attribution Graph for Deep Knowledge Transferability
Submitted by aekwall on Thu, 05/13/2021 - 11:49am
attribution
composability
Computational modeling
computer architecture
Data models
Dictionaries
feature extraction
Human behavior
Metrics
Probes
pubcrawl
Task Analysis
biblio
Network Fingerprinting: Routers under Attack
Submitted by aekwall on Mon, 05/03/2021 - 1:10pm
attack
connectivity
Ecosystems
Hardware
internet
IP networks
network fingerprinting
ping
Predictive Metrics
Probes
pubcrawl
Resiliency
Router Systems Security
security
Topology
Traceroute
biblio
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
tuning
White Box Security
Libraries
machine learning
model characteristics
Probes
pubcrawl
resilience
security
security of data
strategic probing
text analysis
text generation
text transformer
Training
Training data
learning (artificial intelligence)
white box
white box adversarial attacks
Black Box Attacks
composability
Metrics
Resiliency
adversarial attacks
architecture attribution
black box encryption
deep classifier
GPT-2
image based classifiers
image classification
Industries
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
1
2
3
4
5
6
next ›
last »