Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
malicious attacks
biblio
Lightweight Multi-Factor Authentication for Underwater Wireless Sensor Networks
Submitted by grigby1 on Thu, 09/30/2021 - 10:10am
pubcrawl
wireless sensor networks
Human Factors
malicious attacks
Media Access Protocol
Metrics
multifactor authentication
Multi-factor authentication
Propagation losses
Human behavior
resilience
Resiliency
Routing protocols
scientific computing
security
Terrestrial Wireless Sensor Networks
Underwater Wireless Sensor Networks
Wireless communication
biblio
Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers
Submitted by grigby1 on Tue, 02/16/2021 - 11:45am
key data
network topologies
Software Defined Networks
Byzantine Fault Tolerance
byzantine fault tolerance algorithms
cloud-native software
distributed consensus
distributed consensus algorithms
distributed control plane
distributed controller replicas
dynamic reconfiguration
5G networks
modeling frameworks
modeling reliability
network resilience
network softwarization
Raft
replicated SDN controllers
SDN control plane
security considerations
dynamic networks
composability
security
pubcrawl
Metrics
resilience
Resiliency
Software
telecommunication security
Cloud Computing
software fault tolerance
security of data
control systems
software defined networking
Object oriented modeling
fault tolerance
malicious attacks
software-defined network
Reliability
telecommunication network topology
telecommunication network reliability
biblio
Synthesizing Secure Reactive Controller for Unmanned Aerial System
Submitted by grigby1 on Thu, 12/17/2020 - 1:02pm
policy-based governance
unmanned aerial system
UAS vulnerability
UAS attack scenarios
two-player game process
Temporal Logic
security of data
security
secure reactive controller synthesis
secure controller
robot operating systems
Resiliency
resilience
reactive synthesis
pubcrawl
autonomous aerial vehicles
Path Planning
packets injection
multirobots system
multi-robot systems
malicious attacks
LTLMoP platform
Linear Temporal Logic
Human Factors
Human behavior
GPS spoofing
game theory
control engineering computing
complex CPS
buffer-overflow
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 1:42pm
malicious attacks
manet privacy
temporal link
neighbor trust-based security scheme
neighbor trust-based mechanism
mobile network protection
Mobie ad hoc networks
malicious function
mobile nodes
Trust management
telecommunication security
Compositionality
Mobile communication
mobile ad hoc network
mobile ad hoc networks
MANET
Metrics
privacy
pubcrawl
Resiliency
biblio
Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
input-output programs
smart I/O modules
security of data
security
Scalability
Safety
runtime enforcement
Runtime
real-world physical systems
pubcrawl
programmable logic controller I/O modules
programmable controllers
production engineering computing
Power Grid
Monitoring
malicious attacks
control engineering computing
Industries
Industrial Control Systems
industrial control
i-o systems security
I-O Systems
hardware architecture
Hardware
embedded systems
embedded control
cyber-physical systems (CPSs)
cyber-physical systems
cyber-physical attacks mitigation
Cyber-physical attacks
CPS
control systems
biblio
A Reputation Management Framework for MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
pubcrawl
trusted mobile ad hoc networks
Trusted Computing
trust information
security of data
Resiliency
resilience
reputation system
reputation management system
attack
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs
manet privacy
malicious information
malicious attacks
Compositionality
biblio
Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
malicious attacks
telecommunication security
static analysis
smartphone apps
smart phones
Semantics
semantic analysis
security
Resiliency
pubcrawl
multiple layered security analyses method
Androids
internet
Humanoid robots
dynamic analysis
cryptocurrency exchangers
cryptocurrency exchange servicers
cryptocurrency
cryptocurrencies
Cross Layer Security
composability
business trading
biblio
An Internet Medical Care-Oriented Service Security Open Platform
Submitted by aekwall on Mon, 08/24/2020 - 11:46am
convenient online services
Autonomic Security
Visualized Control
standardized connection process
Service
Security Open Platform
personal privacy data security
medical data illegal stealing
Internet medical care-oriented service security open platform
Internet hospitals
Internet Hospital
data access process
security of data
Data Security
malicious attacks
medical information systems
health care
internet
composability
pubcrawl
Resiliency
data privacy
Big Data
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 11:13am
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
1
2
3
4
next ›
last »