Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
network security
biblio
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking
Submitted by grigby1 on Wed, 06/15/2022 - 10:57am
Anomaly Detection
Peer-to-peer computing
pubcrawl
Human behavior
Conferences
Scalability
network security
bitcoin
cryptocurrency
P2P network
Connection Manipulation
eclipse
bitcoin security
biblio
Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection
Submitted by grigby1 on Tue, 06/14/2022 - 1:12pm
Training
feature extraction
machine learning
pubcrawl
resilience
Resiliency
Conferences
Scalability
Big Data
network security
Perturbation methods
Measurement
big data security metrics
network intrusion detection
adversarial artificial intelligence
model robustness evaluation
biblio
Modelling Trust Frameworks for Network-IDS
Submitted by grigby1 on Thu, 06/09/2022 - 2:58pm
security
Servers
Intrusion Detection
pubcrawl
Human behavior
network security
fuzzing
traffic control
trust
network intrusion detection
human trust
biblio
Low Noise Homomorphic Encryption Scheme Supporting Multi-Bit Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:42pm
noise reduction
Multi-bit encryption
ciphertext noise expansion rate
chosen plaintext attack
Human Factors
fully homomorphic encryption
Computational efficiency
Resists
Homomorphic encryption
pubcrawl
Data processing
Metrics
network security
computer security
privacy
Scalability
Resiliency
resilience
biblio
Reinforcement Learning-assisted Threshold Optimization for Dynamic Honeypot Adaptation to Enhance IoBT Networks Security
Submitted by grigby1 on Thu, 06/09/2022 - 2:31pm
network security
threshold optimization
deception technique
honeypot
Human Factors
data dissemination
iobt
Reinforcement learning
Switches
Logic gates
Scalability
Analytical models
security
Resiliency
resilience
pubcrawl
IoT
Internet of Things
biblio
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay
Submitted by grigby1 on Thu, 06/09/2022 - 2:29pm
Redundancy
Spines Overlay
networks
Interledger
ILP
Geography
intrusion tolerance
overlay networks
distributed ledger
Performance
pubcrawl
blockchain
Fault tolerant systems
fault tolerance
network security
Protocols
Resiliency
resilience
Human Factors
biblio
Research on Cybersecurity Strategy and Key Technology of the Wind Farms’ Industrial Control System
Submitted by aekwall on Thu, 06/09/2022 - 11:40am
industrial control
scalable systems
Wind farms
wind farm
security strategies
Key Technologies
Industrial Control Systems(ICS)
mechatronics
Solid modeling
Intrusion Detection
network security
Cybersecurity
Industrial Control Systems
power grids
Resiliency
Scalability
pubcrawl
biblio
Research on vehicle network intrusion detection technology based on dynamic data set
Submitted by grigby1 on Thu, 06/09/2022 - 9:12am
network security
internet of vehicles security
data set
cyber physical systems
Ethernet
Resists
Human Factors
Intelligent vehicles
network intrusion detection
Metrics
feature extraction
cyber security
Internet of Vehicles
Resiliency
resilience
Human behavior
pubcrawl
Intrusion Detection
machine learning algorithms
biblio
Agent-based security protection model of secret-related carrier intelligent management and control
Submitted by grigby1 on Wed, 06/08/2022 - 1:55pm
Robustness
secret carriers
intelligence management and control
hierarchical systems
Agent
intelligent data
Resiliency
security protection
Scalability
security
Compositionality
network security
control systems
Data models
Analytical models
resilience
pubcrawl
biblio
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
deep learning
insider threat
Neural networks
Anomaly Detection
pubcrawl
Human behavior
policy-based governance
network security
performance evaluation
Data models
privacy
Planning
composability
Metrics
Costs
1
2
3
4
5
6
7
8
9
…
next ›
last »