Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
communication security
biblio
Communication and Information Security Assessment of a Digital Substation
Submitted by grigby1 on Mon, 11/29/2021 - 2:10pm
Manufacturing Message Specifications (MMS)
System recovery
Substations
substation automation
standards
Sampled Value (SV)
Resiliency
resilience
pubcrawl
communication security
Internet of Things
information security
IEC standards
IEC 62351
IEC 61850
Generic Object-Oriented Substation Events (GOOSE)
cyber security
Communications technology
biblio
Evaluation of Adversarial Attacks Based on DL in Communication Networks
Submitted by aekwall on Tue, 07/27/2021 - 1:58pm
Resiliency
Metrics
pubcrawl
Perturbation methods
Reliability
information security
Neural networks
testing
Individual Identification
Deep Neural Network
communication security
Communication networks
adversarial example
Black Box Attacks
composability
biblio
The Development of Artificial Intelligence Technology And Its Application in Communication Security
Submitted by grigby1 on Thu, 05/13/2021 - 11:58am
security
Neural networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Industries
Communication networks
composability
maintenance engineering
artificial intelligence technology
artificial intelligence security
supervised learning
communication security
security field
biblio
Ultimate Secrecy in Cooperative and Multi-hop Wireless Communications
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
attenuation
ultimate secrecy ranges
short-range wireless communication systems
point-to-point channel
multihop channel measurements
indoor communication systems
in-device communication systems
frequency 550.0 GHz to 565.0 GHz
cooperative wireless communications
chip-to-chip communications
millimetre wave communication
Information Reuse and Security
frequency reuse
communication secrecy
Receivers
communication channel
radio transmitters
communication security
wireless channels
Compositionality
cooperative communication
Relays
Bandwidth
channel capacity
pubcrawl
Resiliency
security
telecommunication security
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
industrial control
Information Reuse and Security
real-time Ethernet automation systems
PROFINET
open systems
automation-friendly security solution
operational technology
communication security
Compositionality
security requirements
information technology
computer network security
Local area networks
security architecture
automation
standards
pubcrawl
Resiliency
Industrial Control Systems
real-time systems
Protocols
security
biblio
A Decentralized Reputation Management System for Securing the Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
reputation-based security approaches
locally-perceived behavioral reputation parameters
malicious vehicles
Metrics
networking model
Peer-to-peer computing
Protocols
pubcrawl
reputation metrics
reputation system
IoV network
Resiliency
road conditions
road safety
Roads
security
VANET environment
VANET Security
vehicular ad hoc networks
faulty vehicles
communication protocols
communication security
Computational modeling
computer network security
Cryptography
cryptography techniques
cyber physical systems
decentralized reputation
decentralized reputation management system
Acceleration
fully decentralized fashion
Human behavior
Human Factors
Industries
interconnected vehicular system
internet
Internet of Vehicles
Internet of Vehicles paradigm
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
Cooperative Key Generation for Data Dissemination in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
Protocols
wireless sensor networks
wireless security
wireless fading channel
Wireless communication
wireless channels
telecommunication security
shared randomness
sensory data
secret key generation protocol
secret bit mismatch
real-time data dissemination
radio channels
quantized fading channel randomness
Quantization (signal)
pubcrawl
2-hop wireless sensor network testbed
privacy
Human Factors
Human behavior
fading channels
Experimental Evaluation
data dissemination
cyber-physical systems
cyber physical systems
Cryptographic Protocols
CPS Privacy
CPS
confidentiality
Communication system security
communication security
biblio
A Secure and Power-Efficient Constellations for Physical Layer Security
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
communication security
wireless networks
wireless channels
symmetrical constellations
symbol error rate performance
SER performance
power-efficient constellations
power-efficiency
polarization modulation
Monte Carlo simulation
Monte Carlo methods
double-layer constellations
double layers constellations
telecommunication security
8
4
16-order double-layer constellations
physical layer security
error statistics
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
1
2
next ›
last »