Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security measures
biblio
Context-Oriented Privacy Protection in Wireless Sensor Networks
Submitted by
aekwall
on Mon, 10/26/2020 - 11:03am
base station
Compositionality
context oriented
context-oriented privacy protection
data privacy
Human behavior
location data
location privacy
Location Privacy in Wireless Networks
Metrics
privacy
pubcrawl
Resiliency
security breaches
security measures
telecommunication security
wireless sensor networks
WSN
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by
grigby1
on Fri, 09/04/2020 - 3:25pm
Cryptography
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
sensitive information
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
Chromium
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
malicious actor
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
biblio
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques
Submitted by
aekwall
on Mon, 08/24/2020 - 11:46am
security of data
Servers
security
Resiliency
pubcrawl
composability
standards
Cybersecurity
Business
testing
cyber-attacks
Industries
security measures
wireless networks
financial data processing
Human Errors
cash flow
cloud-bases POS
commercial security scanning
confidential customer payment information
expense management
labor reporting
mitigation techniques
on-premise POS
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS
penetration attacks
Point of Sale (POS)
point-on-sale vulnerability
POS system
price adjustment
Sale systems
Autonomic Security
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by
grigby1
on Fri, 08/07/2020 - 2:38pm
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
botnets
Browsers
computer network security
Cryptography
Data Exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
Internet of Things
invasive software
IoT
IoT devices
malicious actor
Payloads
professional networks
pubcrawl
Science of Security
security
security measures
security standard
sensitive environments
sensitive information
Software
strict security policies
unprecedented threats
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by
grigby1
on Thu, 07/30/2020 - 1:15pm
Cryptography
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
cyber-attacks
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
Internet of Things
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Resiliency
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by
aekwall
on Mon, 06/15/2020 - 9:55am
security of data
Computer crime
Internet of Things
Task Analysis
embedded systems
Bayes methods
cyber security
Resiliency
pubcrawl
composability
security attacks
Metrics
internet
tools
security measures
power consumption
security requirements
Space exploration
Power demand
IoT system
architectural security attack description
behavioral security attack description
Design Process
door access system use case
Embedded System Design
Mixed Criticality Design Space Exploration
optimal design
Secure IoT Systems
secure system designing
security aware design space exploration framework
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by
aekwall
on Tue, 05/26/2020 - 10:04am
security of data
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
Immune system
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
artificial immune systems
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
cheat nodes
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
biblio
Experimental Verification of Security Measures in Industrial Environments
Submitted by
aekwall
on Mon, 03/02/2020 - 11:29am
security of data
Scalability
Hardware
Software
Resiliency
pubcrawl
Metrics
production engineering computing
Anomaly Detection
integrated circuits
Firewalls (computing)
verification
Human Factors
industrial control
ICs
control engineering computing
security measures
formal verification
ICS technology
industrial assets
industrial control security
industrial environments
vICS verification framework
Ubiquitous Computing Security
biblio
Phishing in Depth – Modern Methods of Detection and Risk Mitigation
Submitted by
grigby1
on Wed, 02/26/2020 - 3:44pm
Attack vectors
Computer crime
electronic mail service
email attacks
fraud
fraudulent content
Human behavior
Human Factors
machine learning
mass email infrastructures
Metrics
Phishing
pubcrawl
resilience
Resiliency
risk mitigation
security defense mechanisms
security measures
threat
threat mitigation
threats
unsolicited e-mail
virtual experiences
biblio
Challenges of the Existing Security Measures Deployed in the Smart Grid Framework
Submitted by
aekwall
on Mon, 02/17/2020 - 1:16pm
security of data
Monitoring
Scalability
Servers
security
smart devices
SCADA
Resiliency
pubcrawl
privacy
Metrics
smart power grids
smart grid security
Smart Grid
Smart Grids
smart meters
ICs
security measures
smart cities
Meters
power grid system
AMI
energy requirement
intelligent energy utility
smart grid framework
smart meter
1
2
next ›
last »