Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
replay attacks
biblio
Toward attack-resilient state estimation and control of autonomous cyber-physical systems
Submitted by
grigby1
on Tue, 10/06/2020 - 1:12pm
attack resiliency
attack-resilient state estimation
autonomous cyber-physical systems
conjunction achieves
CPS defense techniques
CPS resilience
CPS Security
cube satellite
CubeSat
cyber physical systems
cyber-physical systems
defense techniques
Kalman filter
kalman filtering technique
Kalman filters
mobile robots
pubcrawl
replay attacks
resilience
Resiliency
Robot sensing systems
security of data
sensor attacks
spoofing attack
state estimation
UGV
unmanned ground vehicle
Watermarking
watermarking approach
biblio
An Overview of Security in CoAP: Attack and Analysis
Submitted by
grigby1
on Fri, 09/11/2020 - 10:58am
computer architecture
Internet of Things
security
Servers
pubcrawl
Human behavior
Metrics
resilience
IoT devices
telecommunication security
Protocols
secure protocol
composability
Browsers
Compositionality
Browser Security
authentication mechanism
Constrained Application Protocol
Internet of Things (IoT)
application layer protocol
channel security
client-server architecture
CoAP security attack
Constrained Application Protocol (CoAP)
Copper
cross-protocol attacks
datagram transport layer security
Datagram Transport Layer Security (DTLS)
denial of service
Denial of Service (DoS) attacks
DoS
DTLS
man-in-the-middle attack
network servers
peak security issues
proxy
Relay Attacks
replay attacks
request for comments 7252
RFC 7252
smart ecosystems
UDP
User Datagram Protocol (UDP)
Web transfer protocols
biblio
Replay Attack Detection Using Magnitude and Phase Information with Attention-based Adaptive Filters
Submitted by
aekwall
on Mon, 08/03/2020 - 9:28am
Scalability
telecommunication security
Task Analysis
feature extraction
Resiliency
pubcrawl
Metrics
Databases
replay attacks
fast Fourier transforms
spoofing attacks
phase information
Mel frequency cepstral coefficient
adaptive filters
ASVspoof 2017
attention-based adaptive filters
automatic speech verification systems
conventional feature extraction techniques
frequency bands
frequency-domain analysis
high discriminative information
magnitude channel complementary features
magnitude information
multichannel feature extraction method
original phase information
phase channel
replay attack detection
replay spoofed speech
voice activity detection
adaptive filtering
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by
grigby1
on Fri, 06/19/2020 - 10:49am
active deception protocol
attack resistant deception technique
authentic CRP
authentication
authentication protocol
binary channel
Buildings
challenge response pairs
Cryptographic Protocols
false PUF multiplexing
false trust
Generators
learning (artificial intelligence)
machine learning attacks
ML attack
Multiplexing
mutual authentication
physical unclonable function (PUF)
physical unclonable function-based authentication protocol
policy-based governance
Policy-Governed Secure Collaboration
Protocols
pubcrawl
PUF-based authentication method
Registers
replay attacks
resilience
Resiliency
Resistance
resource-rich server authentication
Scalability
Servers
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by
grigby1
on Fri, 06/19/2020 - 10:48am
Covariance matrices
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
information exchange
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
sensor networks
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
biblio
Event-triggered Control for Networked Control Systems Under Replay Attacks
Submitted by
grigby1
on Fri, 05/08/2020 - 3:41pm
security
pubcrawl
resilience
Resiliency
networked control systems
composability
sensors
control systems
closed loop systems
stability
Metrics
Numerical models
power system stability
Delay effects
control system synthesis
closed-loop system stability
consecutive replay attacks
control signal
event-triggered control
event-triggering condition
general random replay attack model
NCSs
nonlinear control systems
replay attacks
robust event-triggered controller design method
Stability analysis
Networked Control Systems Security
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by
aekwall
on Mon, 05/20/2019 - 9:02am
802.1X / EAP authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
EAP-TLS authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
message serial number
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
request message
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by
grigby1
on Mon, 01/21/2019 - 11:28am
Acoustic Fingerprints
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
biometric-based authentication
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
Human behavior
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
privacy protection
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by
grigby1
on Fri, 10/26/2018 - 3:52pm
coding scheme reliability
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
encryption
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
pubcrawl
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
telecommunication network reliability
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
biblio
Security Analysis of Bluetooth Low Energy Based Smart Wristbands
Submitted by
grigby1
on Mon, 04/02/2018 - 11:54am
Android software application
batteries
Biomedical monitoring
Bluetooth
bluetooth low energy
brute-force attacks
Denial of Service attacks
Heart rate
Human behavior
man-in-the-middle attacks
mobile computing
privacy
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
smart watch
smart wristband
smart wristbands
tools
Trade agreements
wearable computers
Wearable devices
wearables security
1
2
next ›
last »