News
Phishing remains a critical cyber threat, with traditional ML-based detection models relying on grammatical errors and word anomalies as key indicators. However, LLM-generated phishing emails are well ...
Rehosting is the process of porting a physical device to run in software. By rehosting operational technology (OT) devices, we are able to perform cyber analysis on critical infrastructure to protect ...
The rapid proliferation of online discourse, particularly within social networks, has increased the spread of information at unprecedented rates. Although viral content often captures public attention ...
Intent based networking (IBN) is a high-level network configuration concept that allows network operators to use high-level intents instead of complex low-level details. We found there are ...
There is growing concern about image privacy due to the popularity of social media and photo devices, along with increasing use of face recognition systems. However, established image ...
According to the Association of American Railroads, freight rail accounts for 40% of freight in the US. And hazardous materials arrive safely more than 99% of the time. But the geographic scale of ...
This project presents a forensic analysis of Rednote application on the Android system. We simulated typical user interactions with Rednote application to populate data and utilized forensic tools to ...
This research focuses on the development and testing of autopilot systems for lightweight fixed-wing Unmanned Aerial Vehicles (UAVs) within a controlled environment, utilizing the Purdue UAS Research ...
Wearable action cameras capture experiences from a first-person perspective while offering a compact design and hands-free operation. These features make them widely used across various fields, ...
A Memory-Hard Proof of Work (MHPoW) allows a prover to convince an efficient verifier that the prover invested substantial time and memory on a particular computation. Proofs of Work (PoW) in general ...
This paper introduces a new model order reduction problem for cyber-physical systems (CPSs) with vulnerability to stealthy cyberattacks. CPSs are susceptible to stealthy attacks and analyzing ...
Software is now integral to critical U.S. infrastructures, with software supply chains supporting rapid development but also increasing risks. Bugs, vulnerabilities, or unauthorized changes in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results