Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
message transmission
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
Cryptography
encryption
authorisation
unauthorized access
honey encryption
Data Security
probability
pubcrawl
collaboration
Decoding
Data protection
Force
Web sites
Databases
password
encoding
Human Factors
policy-based governance
Brute Force Attack
CDF
cumulative distribution function
discrete distribution function
Distribution functions
distribution probability theory
distribution transforming encoder
honey encryption algorithm
honeywords generation method
message space limitation
message space limitation problem
message transmission
user data protection algorithm
brute force attacks
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
cloud
Cloud Computing
cloud intelligent robot
control engineering computing
digital signature
digital signature algorithm
digital signatures
encryption
intelligent robots
message authentication
message decryption
message encryption
message exchange
message integrity
message transmission
pubcrawl
Public key
public key cryptography
Resiliency
RSA algorithm
Scalability
security
service robot
Service robots
biblio
Intrusion Detection Model of SCADA Using Graphical Features
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
security of data
Protocols
Industrial Control Systems
SCADA
SCADA systems
feature extraction
Resiliency
pubcrawl
composability
Metrics
pattern classification
production engineering computing
Mathematical model
Intrusion Detection
data set
power systems
data visualisation
industrial control
message transmission
time series
command injection attacks
classification model
command injection
denial of service
graphic area features
graphical features
iec 60870-5-104
information scanning
intrusion detection experiment environment
intrusion detection model
Intrusion Detection System (IDS)
Law
response injection
supervisory control and data acquisition (SCADA)
supervisory control and data acquisition system
time series features
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 9:47am
computer network security
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
OpenFlow
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
message transmission
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
secure communication links
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 12:05pm
confidential messages
cooperative jamming
Cryptography
Decoding
direct links
encoding
encryption block
Gaussian codewords
Gaussian processes
Interference
Jamming
Lattices
message destination
message transmission
nested lattice codes
pubcrawl
Science of Security
radiofrequency interference
relay networks (telecommunication)
Relays
scaled compute-and-forward
secure rate region
security
stochastic encoding
structured codes
telecommunication security
Trusted Computing
two hop interference untrusted relay channel
untrusted relay node
wireless channels