Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Performance analysis
biblio
A Small Sample DDoS Attack Detection Method Based on Deep Transfer Learning
Submitted by grigby1 on Tue, 02/16/2021 - 11:57am
deep learning
learning (artificial intelligence)
Neural networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Communication networks
composability
neural nets
Measurement
Performance analysis
Degradation
denial-of-service attack
transfer learning
8LANN network
deep learning detection technique
deep transfer learning
small sample DDoS attack
small-sample DDoS attack detection
DDoS attack detection
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 11:42am
authorisation
pubcrawl
Metrics
resilience
Resiliency
computer network security
security attacks
telecommunication security
composability
computer network management
software defined networking
security measures
Performance analysis
network devices
network attacks
SDN security
business communication
different security mechanisms
dynamic changes
dynamic policy enhanced integrated security architecture
dynamic policy framework
Enterprise Network Security
networking arena
policy-based approach
Policy-based Security Architecture
SDN based enterprise networks
SDN infrastructure
secure SDN
dynamic networks
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Broadcast Encryption
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
data owner
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
Focusing
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Secure storage
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
biblio
A novel solution for securing robot communications based on the MQTT protocol and ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
authentication
automatic robotic surveillance
Data Security
delays
hijacking attacks
Human behavior
Human Factors
internet
IoT
man-in-the-middle attacks
medical robotic surveillance
Message Queuing Telemetry Transport protocol
mobile robots
MQTT
MQTT protocol
operating systems (computers)
Performance analysis
policy-based governance
Protocols
pubcrawl
queueing theory
resilience
Resiliency
robot communications
Robot Operating System
robot operating systems
robot programming
robotic applications
robotic solutions
ROS
ROS-enabled robotic surveillance system
ROS-enabled robotic systems
securing ROS-enabled robotic system
security
security of data
security threats
Servers
Service robots
telecommunication security
telemetry
transport protocols
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
IoT
Scalability
authorisation
Cryptography
encryption
Access Control
data privacy
attribute-based encryption
Internet of Things
Human behavior
pubcrawl
policy-based governance
Computational modeling
edge computing
fine-grained access control
Performance analysis
encryption algorithm
ciphertext pool
large-universe MA-CP-ABE scheme
MA-ABE schemes
Multi-Authority Attribute-Based Encryption
multiauthority attribute-based encryption
Online/Offline Encryption
outsourced decryption
biblio
Performance Analysis of Between Software Defined Wireless Network and Mobile Ad Hoc Network Under DoS Attack
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
pubcrawl
Ad Hoc Network Security
Bandwidth
communication technologies
Compositionality
computer network security
controller
DoS
DoS attack
MANET
MANET routing protocols
MANET structure
Metrics
mobile ad hoc network
mobile ad hoc networks
network interruption
network performance
network security
Performance analysis
performance criteria
performance values
Resiliency
Routing protocols
SDN
SDN controller
SDN structure
SDN technology
Software Defined Network
software defined networking
Software Defined wireless Network
traditional network structure
traditional network used today
wireless network technologies
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
Access Control
access control solutions
Asymmetric Encryption
authorisation
C-KP-ABE
Cloud Computing
cloud resources
cloud servers
cloud-based Internet of Things applications
cloud-based IoT applications
collaboration
collaborative KP-ABE
computer network security
cryptographic scheme
Cryptography
encryption
Internet of Things
key policy attribute based encryption
key-policy attribute-based encryption
KP-ABE
Performance analysis
policy-based governance
pubcrawl
resource-limited networks
Scalability
security scheme
sensors
Servers
storage capacities
storage management
trusted assistant nodes
Trusted Computing
biblio
Multi-Tier and Multi-Band Heterogeneous Wireless Networks with Black Hole Attacks
Submitted by grigby1 on Thu, 06/04/2020 - 10:48am
Communication system security
composability
cyber physical systems
Employment
Human Factors
immersive systems
Performance analysis
privacy
pubcrawl
resilience
Resiliency
sensors
wireless networks
wireless sensor networks
biblio
Performance Analysis of OLSR Protocol under MPR Attack in Progressive Size Grid MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
security
Resiliency
pubcrawl
Routing protocols
Metrics
MANET
mobile ad hoc networks
mobile ad-hoc network
telecommunication network topology
mobile devices
Compositionality
relay networks (telecommunication)
battery life
MANET security
Performance analysis
1-hop neighbor nodes
central administration
control messages
effective routing protocol
efficient OLSR attacks
grid MANET
hello messages
low level applications
mobile ad hoc network
MPR attack
OLSR
OLSR protocol
predefined infrastructures
proactive routing protocol
progressive size grid MANET
topological information
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
Attack vectors
Ad-hoc On-demand Distance Vector
AODV
AODV routing protocols
Black hole attack
common routing protocols
Compositionality
delays
Dsr
DSR routing protocols
dynamic source routing
Jitter
MANET
MANET security
Metrics
mobile ad hoc network
mobile ad hoc networks
Performance analysis
pubcrawl
Resiliency
Routing
routing algorithm
Routing protocols
self-assembly
spoofing attack
suggested trust based routing algorithm
telecommunication security
Throughput
trust
wormhole attack
wormhole tunnels
1
2
3
next ›
last »