Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,184,851 papers from all fields of science
Search
Sign In
Create Free Account
Carnegie Mellon CyLab
Known as:
CyLab
The Carnegie Mellon CyLab Security and Privacy Institute is a computer security research center at Carnegie Mellon University. Founded in 2003 as a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Computer security
United States Computer Emergency Readiness Team
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Considering Risk in Infrastructure Internet of Things: Observations and Recommendations
D. Sicker
IEEE Systems Man and Cybernetics Magazine
2019
Corpus ID: 199439949
This article explores the impact of the Internet of Things (IoT)-the emerging set of embedded sensors, actuators, controllers…
Expand
2012
2012
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory
Haemin Park
,
Dongwon Seo
,
Heejo Lee
,
A. Perrig
Communication Systems and Applications
2012
Corpus ID: 54621465
A smart grid is verging on a promising technology for reforming global electrical grids. Currently, attackers compromise security…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
2009
2009
On the Effect of Packet Acknowledgment on the Stability and Performance of Networked Control Systems
E. Garone
,
B. Sinopoli
,
A. Casavola
2009
Corpus ID: 14832917
This work concerns discrete-time Linear Quadratic Gaussian (LQG) optimal control of a remote plant that communicates with the…
Expand
2008
2008
Carnegie Mellon's CyDAT: Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics
C. DiFatta
,
Mark Poepping
,
Daniel V. Klein
WASL
2008
Corpus ID: 41712203
The number and complexity of distributed applications has exploded, and to-date, each has had to create its own method for…
Expand
2007
2007
Integrating Incremental Feature Weighting into NaÏve Bayes Text Classifier
Han-joon Kim
,
Jae-young Chang
International Conference on Machine Learning and…
2007
Corpus ID: 22477496
In the real-world operational environment, text classification systems should handle the problem of incomplete training set and…
Expand
2007
2007
Generalized Low Dimensional Feature Subspace for Robust Face Recognition on Unseen datasets using Kernel Correlation Feature Analysis
R. Abiantun
,
M. Savvides
,
B. Vijayakumar
IEEE International Conference on Acoustics…
2007
Corpus ID: 15193133
In this paper we analyze and demonstrate the subspace generalization power of the kernel correlation feature analysis (KCFA…
Expand
2007
2007
Guaranteeing Secrecy in Wireless Networks using Artificial Noise
S. Goel
2007
Corpus ID: 15958583
The broadcast nature of the wireless medium makes the communication over this medium vulnerable to eavesdropping. This report…
Expand
Highly Cited
2006
Highly Cited
2006
Illumination Tolerant Face Recognition Using a Novel Face From Sketch Synthesis Approach and Advanced Correlation Filters
Yung-Hui Li
,
M. Savvides
,
B. Kumar
IEEE International Conference on Acoustics Speech…
2006
Corpus ID: 10982355
Current state-of-the-art approach for performing face sketch recognition transforms all the test face images into sketches, and…
Expand
2006
2006
Rapid Trust Establishment for Transient Use of Unmanaged Hardware
Ajay Surie
,
A. Perrig
,
M. Satyanarayanan
,
D. Farber
2006
Corpus ID: 2340973
Abstract : Transient use of PCs has grown in importance with the advent of Internet cafes and the emergence of personalization…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE