Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,293,699 papers from all fields of science
Search
Sign In
Create Free Account
Carnegie Mellon CyLab
Known as:
CyLab
The Carnegie Mellon CyLab Security and Privacy Institute is a computer security research center at Carnegie Mellon University. Founded in 2003 as a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Computer security
United States Computer Emergency Readiness Team
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Considering Risk in Infrastructure Internet of Things: Observations and Recommendations
D. Sicker
IEEE Systems Man and Cybernetics Magazine
2019
Corpus ID: 199439949
This article explores the impact of the Internet of Things (IoT)-the emerging set of embedded sensors, actuators, controllers…
Expand
2012
2012
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory
Haemin Park
,
Dongwon Seo
,
Heejo Lee
,
A. Perrig
Communication Systems and Applications
2012
Corpus ID: 54621465
A smart grid is verging on a promising technology for reforming global electrical grids. Currently, attackers compromise security…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
2011
2011
Who, When, Where: Obfuscation Preferences in Location-Sharing Applications
Jayant Venkatanathan
,
Jialiu Lin
,
+5 authors
Eran Toch
2011
Corpus ID: 8783555
Abstract : This paper presents a study of obfuscation practices in location-sharing systems. The study shows that users have…
Expand
2011
2011
Probabilistic Infrastructureless Positioning in the Pocket
Le T. Nguyen
,
Y. Zhang
Mobile Computing, Applications, and Services
2011
Corpus ID: 17443841
With the increasing popularity of smart phones, knowing the accurate position of users has become critical to many context-aware…
Expand
2009
2009
On the Effect of Packet Acknowledgment on the Stability and Performance of Networked Control Systems
E. Garone
,
B. Sinopoli
,
A. Casavola
2009
Corpus ID: 14832917
This work concerns discrete-time Linear Quadratic Gaussian (LQG) optimal control of a remote plant that communicates with the…
Expand
2008
2008
Carnegie Mellon's CyDAT: Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics
C. DiFatta
,
Mark Poepping
,
Daniel V. Klein
WASL
2008
Corpus ID: 41712203
The number and complexity of distributed applications has exploded, and to-date, each has had to create its own method for…
Expand
2007
2007
Integrating Incremental Feature Weighting into NaÏve Bayes Text Classifier
Han-joon Kim
,
Jae-young Chang
International Conference on Machine Learning and…
2007
Corpus ID: 22477496
In the real-world operational environment, text classification systems should handle the problem of incomplete training set and…
Expand
2007
2007
Generalized Low Dimensional Feature Subspace for Robust Face Recognition on Unseen datasets using Kernel Correlation Feature Analysis
R. Abiantun
,
M. Savvides
,
B. Vijayakumar
IEEE International Conference on Acoustics…
2007
Corpus ID: 15193133
In this paper we analyze and demonstrate the subspace generalization power of the kernel correlation feature analysis (KCFA…
Expand
2007
2007
Guaranteeing Secrecy in Wireless Networks using Artificial Noise
S. Goel
2007
Corpus ID: 15958583
The broadcast nature of the wireless medium makes the communication over this medium vulnerable to eavesdropping. This report…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE