Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Rethinking Information Sharing for Threat Intelligence
Submitted by grigby1 on Wed, 05/30/2018 - 3:57pm
computational intelligence
Human behavior
Human Factors
information sharing
Metrics
privacy
pubcrawl
resilience
Resiliency
Scalability
Security Risk Management
standards
threat intelligence
biblio
Attack-Resilient State Estimation for Noisy Dynamical Systems
Submitted by el_wehby on Wed, 05/16/2018 - 6:37pm
attack-resilient state estimation
control systems
cyber-physical systems
cyberphysical systems security
Linear systems
Noise measurement
robustness of state estimators
security
standards
state estimation
Symmetric matrices
1505701
biblio
Digital signature using MAC address based AES-128 and SHA-2 256-bit
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
MAC address
word length 256 bit
telecommunication security
standards
SHA-2 256 bit
Seminars
secure hash algorithm
Resiliency
resilience
Repudiation
pubcrawl
Metrics
advanced encryption standard
human factor
Human behavior
encryption
digital signatures
digital signature
digital messaging
Cryptography
computer science
composability
AES-128
biblio
Supporting security protocols on CAN-based networks
Submitted by el_wehby on Mon, 05/14/2018 - 2:27pm
Cryptographic Protocols
standards
shared key generation protocol
security protocols
security
Protocols
physical bus segregation
Payloads
Observers
network security
Electronic mail
arbitrary binary Boolean functions
controller area networks
Controller area network (CAN)
controller area network
computer network security
CAN-based networks
CAN-based automotive systems
CAN XR
CAN protocol security-oriented enhancements
CAN data-link layer
Boolean functions
1646317
biblio
Heuristics-based approach for identifying critical N \#x2014; k contingencies in power systems
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
Power system protection
system operators
system failure
standards
standard IEEE-14 bus system
Security Heuristics
Scalability
Resiliency
Resilience.
reliable operation
pubcrawl
Prediction algorithms
power system transient stability
power system stability
power system security
power system reliability
Algorithm design and analysis
power system identification
power system faults
possible critical N - k contingencies
N—k contingency analysis
multiple critical N-k contingencies
mitigation strategies
IEEE-57 bus system
IEEE-39 bus system
Heuristic algorithms
electrical power systems
dangerous contingency
critical contingencies
Cascading Failures
blackouts
biblio
New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
image steganography scheme
steganography detection
Steganography
standards
smoothing methods
secret message concealing
PVD systems
pubcrawl
privacy
Neural networks
neural nets
Metrics
media file
improved-AMBTC algorithm
improved absolute moment block truncation coding algorithm
adaptive systems
Image Steganography
Image edge detection
image concealing
image compression methods
Image coding
I-AMBTC
hybrid adaptive neural networks
HVS
edge detection operators
data compression
composability
ART
ANNS
biblio
Cyber-attack detection in the networked control system with faulty plant
Submitted by K_Hooper on Wed, 04/04/2018 - 9:52am
networked control systems
Underwater vehicles
Underwater Networks
Trajectory
tools
standards
security
Scalability
ROV
Resiliency
remotely operated underwater vehicle
pubcrawl
predictive control
Adaptation models
Networked Control System
Metrics
mathematical framework
intelligent generalized predictive controller
intelligent control
IGPC
faulty plant
fault-tolerant ability
fault tolerant control
fault accommodation technique
cyber-attack detection
autonomous underwater vehicles
biblio
Wearable Device User Authentication Using Physiological and Behavioral Metrics
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
sensors
physiological data
Physiological Fingerprint
physiological metrics
privacy
pubcrawl
Reliable Data Collection
resilience
Resiliency
Scalability
patient monitoring
smart wearables
standards
wearable computers
wearable device user authentication
Wearable Security
Wearable-User Authentication
wearable-user authentication mechanism
wearables security
wellness-related metrics
health care
Apple Watch
authentication
authorisation
behavioral metrics
Biomedical monitoring
biometrics (access control)
coarse-grain minute-level physical activity
feature extraction
Fitbit users
Activity-based Fingerprint
Healthcare
healthcare providers
Heart rate
Human behavior
message authentication
Microsoft Band
microsoft windows
mobile computing
one-time authentication approaches
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
DSA
Three-dimensional displays
standards
Resiliency
resilience
Public key
pubcrawl
private and public key encryption
Metrics
Human behavior
encryption
elliptic curve
3DES
Diffie-Hellman and RSA
DES
decryption
Cryptography
Compositionality
Cloud Computing
Classification algorithms
Ciphers
Blowfish
Asymmetric Encryption
AES
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »