Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
communication security
biblio
Research and Application of Communication Security in Security and Stability Control System of Power Grid
Submitted by grigby1 on Fri, 03/17/2023 - 11:35am
Reliability engineering
random number
Asymmetric Encryption
key management
Asia
random key generation
Resiliency
communication security
Electrical Engineering
Focusing
pubcrawl
Stability analysis
security and stability control system
power system stability
resilience
control systems
Scalability
Metrics
Human Factors
Human behavior
biblio
An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator
Submitted by grigby1 on Fri, 03/03/2023 - 9:22am
composability
entropy sources
random number generators
Linux Operating System Security
communication security
resilience
Compositionality
cognition
Linux
encryption
estimation
Entropy
Generators
Conferences
Resiliency
Metrics
pubcrawl
biblio
Communication Security Design of Distribution Automation System with Multiple Protection
Submitted by grigby1 on Fri, 07/29/2022 - 5:14pm
encryption
pubcrawl
resilience
Resiliency
Conferences
computer security
power grids
Consumer electronics
automation
Operating systems security
communication security
distribution automation system
encryption distribution terminal
multiple protection
biblio
Communication and Information Security Assessment of a Digital Substation
Submitted by grigby1 on Mon, 11/29/2021 - 2:10pm
Manufacturing Message Specifications (MMS)
System recovery
Substations
substation automation
standards
Sampled Value (SV)
Resiliency
resilience
pubcrawl
communication security
Internet of Things
information security
IEC standards
IEC 62351
IEC 61850
Generic Object-Oriented Substation Events (GOOSE)
cyber security
Communications technology
biblio
Evaluation of Adversarial Attacks Based on DL in Communication Networks
Submitted by aekwall on Tue, 07/27/2021 - 1:58pm
Resiliency
Metrics
pubcrawl
Perturbation methods
Reliability
information security
Neural networks
testing
Individual Identification
Deep Neural Network
communication security
Communication networks
adversarial example
Black Box Attacks
composability
biblio
The Development of Artificial Intelligence Technology And Its Application in Communication Security
Submitted by grigby1 on Thu, 05/13/2021 - 11:58am
security
Neural networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Industries
Communication networks
composability
maintenance engineering
artificial intelligence technology
artificial intelligence security
supervised learning
communication security
security field
biblio
Ultimate Secrecy in Cooperative and Multi-hop Wireless Communications
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
attenuation
ultimate secrecy ranges
short-range wireless communication systems
point-to-point channel
multihop channel measurements
indoor communication systems
in-device communication systems
frequency 550.0 GHz to 565.0 GHz
cooperative wireless communications
chip-to-chip communications
millimetre wave communication
Information Reuse and Security
frequency reuse
communication secrecy
Receivers
communication channel
radio transmitters
communication security
wireless channels
Compositionality
cooperative communication
Relays
Bandwidth
channel capacity
pubcrawl
Resiliency
security
telecommunication security
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
industrial control
Information Reuse and Security
real-time Ethernet automation systems
PROFINET
open systems
automation-friendly security solution
operational technology
communication security
Compositionality
security requirements
information technology
computer network security
Local area networks
security architecture
automation
standards
pubcrawl
Resiliency
Industrial Control Systems
real-time systems
Protocols
security
biblio
A Decentralized Reputation Management System for Securing the Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
reputation-based security approaches
locally-perceived behavioral reputation parameters
malicious vehicles
Metrics
networking model
Peer-to-peer computing
Protocols
pubcrawl
reputation metrics
reputation system
IoV network
Resiliency
road conditions
road safety
Roads
security
VANET environment
VANET Security
vehicular ad hoc networks
faulty vehicles
communication protocols
communication security
Computational modeling
computer network security
Cryptography
cryptography techniques
cyber physical systems
decentralized reputation
decentralized reputation management system
Acceleration
fully decentralized fashion
Human behavior
Human Factors
Industries
interconnected vehicular system
internet
Internet of Vehicles
Internet of Vehicles paradigm
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
1
2
3
next ›
last »