Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Computer hacking
biblio
Using Counterfactual Regret Minimization and Monte Carlo Tree Search for Cybersecurity Threats
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
Nash Equilibrium
threat mitigation
MCTS
incomplete information games
extensive form games
counterfactual regret minimization
CFR
Sea measurements
codes
Minimization
Computer hacking
Monte Carlo methods
Metrics
Games
Resiliency
resilience
Human behavior
pubcrawl
Predictive models
biblio
A Novel System for Detecting and Preventing SQL Injection and Cross-Site-Script
Submitted by aekwall on Tue, 04/19/2022 - 11:27am
IP networks
Intrusion Detection
Protocols
Computer hacking
pubcrawl
Scalability
Resiliency
Human behavior
Firewalls (computing)
cross-site scripting
SQL injection
Cross Site Script
Intrusion Prevention System (IPS)
Network Intrusion Detection System (NIDS)
Reverse Proxy
Cross Site Scripting
biblio
Preventing IoT DDoS Attacks using Blockchain and IP Address Obfuscation
Submitted by grigby1 on Wed, 04/13/2022 - 2:53pm
composability
DDoS Attack Prevention
IP address obfuscation
distributed denial of service
blockchains
identity authentication
denial-of-service attack
Internet of Things
Signal processing algorithms
Metrics
signal processing
Wireless communication
authentication
Resiliency
resilience
Human behavior
pubcrawl
blockchain
Computer hacking
biblio
‘WLAN Security Protocols and WPA3 Security Approach Measurement Through Aircrack-ng Technique’
Submitted by aekwall on Mon, 03/14/2022 - 1:42pm
security
Protocols
Linux
Computer hacking
pubcrawl
Resiliency
wireless networks
Predictive Metrics
Atmospheric modeling
Aircrack-ng
Airodump-ng
Crack
Kali Linux
Standards organizations
Router Systems Security
biblio
Perceptual Image Hashing Using Surffor Feature Extraction and Ensemble Classifier
Submitted by grigby1 on Mon, 03/14/2022 - 12:22pm
Policy Based Governance
surf features
Ensemble classifier
image hashing
Keyboards
Image coding
Resistance
Signal processing algorithms
Metrics
signal processing
Safe Coding
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
feature extraction
Computer hacking
biblio
A Study on Security Attacks in Wireless Sensor Network
Submitted by grigby1 on Tue, 03/01/2022 - 4:34pm
sensor security
Computer hacking
machine learning
Network Security Architecture
pubcrawl
resilience
Resiliency
security
security attacks
Task Analysis
Weather forecasting
Wireless communication
wireless sensor networks
biblio
Empirical Study on Reconnaissance Attacks in SDN-Aware Network for Evaluating Cyber Deception
Submitted by grigby1 on Tue, 03/01/2022 - 4:23pm
Penetration Testing
software-defined networking
SDN security
Scalability
Resiliency
resilience
reconnaissance attack
Reconnaissance
pubcrawl
Communications technology
network systems
Network reconnaissance
network architecture
Intrusion Detection
Distance measurement
cyber deception
Computer hacking
biblio
A Network Intrusion Detection Approach at the Edge of Fog
Submitted by grigby1 on Tue, 03/01/2022 - 4:15pm
network architecture
Resiliency
resilience
pubcrawl
Production
Neural networks
neural network
network security
network intrusion detection
composability
Metrics
Intrusion Detection
Internet of Things (IoT)
Image edge detection
Fog computing
Computer hacking
computer architecture
biblio
Programmable Data Planes as the Next Frontier for Networked Robotics Security: A ROS Use Case
Submitted by grigby1 on Thu, 02/03/2022 - 4:08pm
Protocols
robot operating systems security
in-network computing
P4
Human Factors
ROS
Writing
operating systems
malware
collaboration
robots
Resiliency
resilience
policy-based governance
pubcrawl
security
Computer hacking
biblio
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks
Submitted by grigby1 on Thu, 02/03/2022 - 4:06pm
operating systems
robot operating systems security
Zenbo
forensic
Assessment
Human Factors
Systematics
Humanoid robots
android
Mobile handsets
tools
Linux
Resiliency
resilience
policy-based governance
pubcrawl
IoT
security
Computer hacking
collaboration
1
2
3
4
5
6
7
8
next ›
last »