Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Force
biblio
Design and Implementation of NIDS Notification System Using WhatsApp and Telegram
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
administrator
attack port
attack time
brute force attacks
Death attacks
Floods
Force
Human behavior
Human Factors
Intrusion Detection
IP networks
network intrusion detection system
NIDS
NIDS notification System
Notification
notification platform
packet data traffic
policy-based governance
pubcrawl
real-time systems
security of data
Servers
Snort
Social network services
social networking (online)
SSH brute force attacks
SYN flood attacks
telecommunication traffic
Telegram
whatsapp
biblio
Distributed Transform Encoder to Improve Diffie-Hellman Protocol for Big Message Security
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
Brute Force Attack
brute force attacks
Cryptography
Diffie-Hellman protocol
distribution transforming encoder
encryption
Force
Hash functions
Human behavior
Human Factors
Long Messages Encryption
Main in the Middle Attack
policy-based governance
Protocols
pubcrawl
Public key
security
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
anomalous packets
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
deep learning models
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
machine learning
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
SAE
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
biblio
Network Security System on Multiple Servers Against Brute Force Attacks
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
brute force attacks
Communication networks
Databases
Fail2ban
Force
Human behavior
Human Factors
IDPS
IDS
IP networks
Monitoring
network security
policy-based governance
pubcrawl
security
Servers
biblio
High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
Benchmark testing
Brute Force Attack
brute force attacks
Camouflage Integrated Circuit (IC)
Force
High Efficiency
Human behavior
Human Factors
integrated circuits
Intellectual Property (IP) Protection
Logic gates
policy-based governance
pubcrawl
reverse engineering
security
simulation
biblio
Trust in Medical Human-Robot Interactions based on Kinesthetic guidance
Submitted by grigby1 on Tue, 12/01/2020 - 1:35pm
Robot Trust
biomechanics
Force
Human behavior
Human Factors
human-robot interaction
kinesthetic guidance
kinesthetic mitigation strategies
medical human-robot interactions
medical robotics
participant trust
patient arm
patient rehabilitation
patient-specific tasks
pubcrawl
resilience
Resiliency
Robot sensing systems
robust trust
Service robots
Task Analysis
therapeutic robot
Universal RoboTrainer
usability
usability issues
verbal mitigation strategies
biblio
Impulse Exciter of Rotating Blades With an Increased Excitation Force
Submitted by aekwall on Mon, 11/30/2020 - 12:15pm
Blades
Compositionality
cyber physical systems
dynamic measurement and testing
electromagnetic fields
electromagnetic forces
electromagnetic vibration excitation
Electromagnets
excitation force
Excitation of vibration
Force
impulse exciter
increased excitation force
Internet of Things
Magnetic Remanence
Magnetization
Permeability
pubcrawl
remanence
remanent induction reduction
Resiliency
RLC circuits
rotating machine blade
rotating machine blades
vibration measurement
Vibrations
biblio
Concept Inventories in Cybersecurity Education: An Example from Secure Programming
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
computer science education
computer security
concept inventory
cyber physical systems
Cybersecurity
cybersecurity education
Cybersecurity Education Curriculum 2017 guidelines
Delphi study
education
Force
privacy
programming
Programming profession
pubcrawl
secure programming
secure programming concept inventory
security of data
testing
tools
biblio
Cybersecurity Associate Degree Program Curriculum
Submitted by grigby1 on Wed, 11/04/2020 - 1:43pm
& Technical College
Accreditation
ACM CCECC
Associate Degree
associate degree cybersecurity programs
associate level cybersecurity workforce
community
community college educators
computer science education
computer security
CSEC2Y
curriculum
cyber physical systems
Cyber2yr
Cyber2yr work
Cybersecurity
cybersecurity associate degree program curriculum
cybersecurity education
cybersecurity education programs
educational courses
Educational institutions
Force
global cybersecurity guide
Guidelines
higher education
Junior
knowledgeable level cybersecurity workforce
privacy
professional field
pubcrawl
qualified cybersecurity workforce
security of data
student competency focused curriculum
Task Analysis
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
programming
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
Bandwidth
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
TCPIP
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
evolutionary design approach
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
1
2
3
4
5
6
next ›
last »