Quantcast
Channel: CPS-VO - U.S. Government
Browsing latest articles
Browse All 85 View Live

Hiding Instructions in a Processor

Luciano Brignone Zhaokun Han Austin Benedetti Muhammad Yasin Jeyavijayan Rajendran License:  Creative Commons 2.5

View Article



Hash functions: Properties, an Attack, and an Application

Ranuli Abeysinghe License:  Creative Commons 2.5

View Article

Khaleesi: Breaking The Advertising & Tracking Redirect Chains

Charlie Wolfe Umar Iqbal M. Zubair Shafiq License:  Creative Commons 2.5

View Article

LEADER: Low-Rate Denial-of-Service Attack Defense

Rajat Tandon Haoda Wang Nicolaas Weideman Shushan Arakelyan Christophe Hauser Jelena Mirkovic License:  Creative Commons 2.5

View Article

More Complete DOM XSS Detection with Dynamic Event Generation

Jonathan Miao Rintaro Fujita William Melicher Michael Stroucken Lujo Bauer Limin Jia License:  Creative Commons 2.5

View Article


Non-malleable Digital Lockers for Efficiently Sampleable Distribution

Peter Fenteany Benjamin Fuller License:  Creative Commons 2.5

View Article

Online Digital Forensics Courses and Labs for Students and Professionals

Jacob Crain Yier Jin License:  Creative Commons 2.5

View Article

Physical (PHY) Layer Features for Device Authentication

Bryan Manzi Gian Claude Peter Ekpewoh Timothy Pierson Michel Reece-Kornegay David Kotz License:  Creative Commons 2.5

View Article


Physical Inspection for PCB Assurance

Jonathan Villanueva Nathan Jessurun Mukhil Azahgan Navid Asadizanjani License:  Creative Commons 2.5

View Article


Promoting Cybersecurity by Design for Software

Morgan Brockman Ying Tang Sameer Patil License:  Creative Commons 2.5

View Article

Protecting Cyber Physical Systems Using A Game-Theoretical Approach

Leander Davis Mina Guirguis License:  Creative Commons 2.5

View Article

Replay Attack Detection in Multimedia of Things (MoT)

Khalid Malik Brandon Kujawa License:  Creative Commons 2.5

View Article

Secure and Scalable Network Packet Processing Using OpenNetVM and mTCP

Dennis Afanasev Timothy Wood Mykola Yurchenko License:  Creative Commons 2.5

View Article


Secure Tensor Processor in the TrustZone

Heejin Park Noah Curran Felix Xiaozhu Lin License:  Creative Commons 2.5

View Article

Snout, an IoT Pentesting-Tool

John Mikulskis Johannes Becker Stefan Gvozdenovic David Starobinski License:  Creative Commons 2.5

View Article


Static Information Flow Tracking (SIFT) Analysis for Hardware Verification

christie lincoln lisa luo amir uqdah alvin zhang License:  Creative Commons 2.5

View Article

Symbolic Execution for Simple R

Stephen Chong Marco Gaboardi Gian Pietro Farina Laura Zharmukhametova License:  Creative Commons 2.5

View Article


The Price is (not) Right Comparing Privacy in Free and Paid Apps

Catherine Han Irwin Reyes Alvaro Feal Joel Reardon Narseo Vallina-Rodriguez Serge Egelman License:  Creative Commons 2.5

View Article

The Susceptibilty of Disclosing Private Security Information in College Students

Rachel Bleiman Aunshul Rege License:  Creative Commons 2.5

View Article

TrustZone as a Secure Tensor Processor

Heejin Park Noah Curran Felix Xiaozhu Lin License:  Creative Commons 2.5

View Article

Using Deep Learning to Bridge the Semantic Gap between Natural Language and Code

Chris Crabtree Rocky Slavin Xiaoyin Wang Jianwei Niu License:  Creative Commons 2.5

View Article


Whos Calling You?

Jeongbin Oh License:  Creative Commons 2.5

View Article


Dr. Celeste Paul talks about Hacking Stress in Cybersecurity Operations

Celeste Lyn Paul is a Senior Researcher at the National Security Agency. Her work focuses on understanding the human factors of cybersecurity. See her recent RSA Conference keynote on Hacking Stress in...

View Article

CPS: Breakthrough: Secure Interactions with Internet of Things

Kang Shin License:  Creative Commons 2.5

View Article

Understanding the Impact of Social and Physical Environment Factors on Crime...

Marc Berman Charlie Catlett Kate Cagney Nicola Ferrier License:  Creative Commons 2.5

View Article


Cyber Security booklet for Middle and High School students

The National Cryptologic Foundation Cyber Center for Education and Innovation has just released a great booklet, Outsmart Cyberthreats, on cyber security for Middle and High School students. The...

View Article

Effective Resource Planning and Disbursement during the COVID-19 Pandemic

Quanyan Zhu Lorna Thorpe Rae Zimmermann License:  Creative Commons 2.5

View Article

NIST Releases Draft Security Feature Recommendations for IoT Devices

NIST Releases Draft Security Feature Recommendations for IoT Devices"Core Baseline" guide offers practical advice for using everyday items that link to computer networks.August 01, 2019read more

View Article

TIP: Directorate for Technology, Innovation and Partnerships

Government - Free license Carol Bessel License:  Other (as defined in the Description section below)

View Article



Robotics in the Workplace

Frank Hearl License:  Creative Commons 2.5

View Article
Browsing latest articles
Browse All 85 View Live




Latest Images