Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security mechanisms
biblio
Development of security mechanisms for a remote sensing system based on opportunistic and mesh networks
Submitted by aekwall on Mon, 03/01/2021 - 3:44pm
composability
environment monitoring system
MESH network
Mesh networks
Metrics
opportunistic network
Opportunistic Networks
pubcrawl
remote environment monitoring system
remote sensing
remote sensing system
Resiliency
security mechanism development
security mechanisms
sensor node
telecommunication security
Wireless Mesh Network Security
wireless mesh networks
wireless sensor networks
biblio
DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems
Submitted by aekwall on Mon, 01/25/2021 - 11:53am
computer network security
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
security mechanisms
actuator security
DARIA
designing actuators to resist arbitrary attacks
generci adversary model
Optimal Defense
secure design paradigm
security-by-design
specific attack algorithm
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
pubcrawl
Ad Hoc Network Security
aircraft communication
autonomous aerial vehicles
Compositionality
ground control station
message authentication
Metrics
mobile ad hoc network
mobile ad hoc networks
multi-robot systems
multiple node attack
network architecture
network integrity
performance evaluation
quality of service
Real-world experiment
Resiliency
Routing Protocol
Routing protocols
secure routing protocol
Secure UAV Ad hoc routing Protocol
security architecture
security mechanisms
security of data
SUAP
telecommunication security
UAANET
UAV ad hoc network
UAV swarm
wormhole attack detection
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
Cloud Computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Peer-to-peer computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
pubcrawl
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
cloud data transmission
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
Intrusion Detection
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
sensors
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
Transmission line measurements
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
radar detection
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
biblio
Natural Language Processing and Deep Learning Towards Security Requirements Classification
Submitted by aekwall on Mon, 05/18/2020 - 9:53am
deep learning
Human behavior
learning (artificial intelligence)
machine learning
machine learning techniques
natural language processing
pattern classification
pubcrawl
Recurrent neural networks
Resiliency
Scalability
security
security mechanisms
security of data
security requirements classification
Software
software engineering
software engineering community
Task Analysis
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
composability
Resiliency
Cross Layer Security
5G mobile communication
5G networks
cellular IoT
cellular network architecture
cellular radio
Cloud Computing
Computer crime
Conferences
Cross-Layer Security
edge computing
Identity management
Identity provider
Internet of Things
IoT device
IoT platform
IoT security
message authentication
Mobile Identity Management
mobile network infrastructure
Narrowband IoT
NB-IOT
pubcrawl
Scalability
Scalable Security
secure authentication mechanism
security mechanisms
telecommunication security
biblio
Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
signature based defense
pubcrawl
attack signature
computer network security
defense mechanisms
flow monitoring
internet
Internet of Things
Intrusion Detection
Intrusion Detection Systems
IoT communications
IoT devices
IP flow properties
IP networks
Monitoring
network attacks
network intrusion detection
privacy
Protocols
resilience
Resiliency
resource limitations
Scalability
security
security mechanisms
sensitive information
telecommunication traffic
tools
biblio
Applied Layered-Security Model to IoMT
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
data privacy
Device-Connect-Manage
health care
healthcare industry
Human behavior
Human Factors
immune information security
Immune system
Industries
information security
internet of medical things
Internet of Things
IoMT
IoT
layered-security
layered-security model
medical field
Medical services
Metrics
privacy
pubcrawl
Resiliency
Scalability
security mechanisms
security of data
security threats
Ubiquitous Computing Security
Wearable Device
wearables security
biblio
Faster-Than-Nyquist Signaling for Physical Layer Security on Wireless Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 1:22pm
security of data
information security
Resiliency
pubcrawl
composability
Metrics
privacy
smart power grids
security mechanisms
smart grid security
power engineering computing
physical layer security
signal processing security
information protection
wireless networks
encoding
signal processing
artificial noise
coding
faster-than-Nyquist
faster-than-Nyquist signaling
wireless network segment
wireless smart grid
1
2
3
4
next ›
last »