Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious attacks
biblio
Blockchain-based trust evaluation mechanism for Internet of Vehicles
Submitted by grigby1 on Fri, 09/08/2023 - 10:25am
Decision Making
trust computing
malicious attacks
Human Factors
Memory
simulation
Complexity theory
Data Security
smart contracts
security
Internet of Vehicles
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
blockchain
biblio
A Resiliency Coordinator Against Malicious Attacks for Cyber-Physical Systems
Submitted by grigby1 on Fri, 03/17/2023 - 10:19am
computer architecture
pubcrawl
resilience
Resiliency
Software
control systems
Virtual machine monitors
cyber-physical systems
Physical layer
automation
Hierarchical Control Systems.
malicious attacks
Resiliency Coordinator
biblio
Securing SDN Enabled IoT Scenario Infrastructure of Fog Networks From Attacks
Submitted by grigby1 on Fri, 02/17/2023 - 5:26pm
computer architecture
Servers
pubcrawl
resilience
Resiliency
Software
Scalability
Cryptography
delays
real-time systems
energy consumption
malicious attacks
SDN security
Datagram Transport Layer Security (DTLS)
IoT-Fog networks
software defined networking (SDN)
biblio
Lightweight Multi-Factor Authentication for Underwater Wireless Sensor Networks
Submitted by grigby1 on Thu, 09/30/2021 - 11:10am
pubcrawl
wireless sensor networks
Human Factors
malicious attacks
Media Access Protocol
Metrics
multifactor authentication
Multi-factor authentication
Propagation losses
Human behavior
resilience
Resiliency
Routing protocols
scientific computing
security
Terrestrial Wireless Sensor Networks
Underwater Wireless Sensor Networks
Wireless communication
biblio
Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers
Submitted by grigby1 on Tue, 02/16/2021 - 12:45pm
key data
network topologies
Software Defined Networks
Byzantine Fault Tolerance
byzantine fault tolerance algorithms
cloud-native software
distributed consensus
distributed consensus algorithms
distributed control plane
distributed controller replicas
dynamic reconfiguration
5G networks
modeling frameworks
modeling reliability
network resilience
network softwarization
Raft
replicated SDN controllers
SDN control plane
security considerations
dynamic networks
composability
security
pubcrawl
Metrics
resilience
Resiliency
Software
telecommunication security
Cloud Computing
software fault tolerance
security of data
control systems
software defined networking
Object oriented modeling
fault tolerance
malicious attacks
software-defined network
Reliability
telecommunication network topology
telecommunication network reliability
biblio
Synthesizing Secure Reactive Controller for Unmanned Aerial System
Submitted by grigby1 on Thu, 12/17/2020 - 2:02pm
policy-based governance
unmanned aerial system
UAS vulnerability
UAS attack scenarios
two-player game process
Temporal Logic
security of data
security
secure reactive controller synthesis
secure controller
robot operating systems
Resiliency
resilience
reactive synthesis
pubcrawl
autonomous aerial vehicles
Path Planning
packets injection
multirobots system
multi-robot systems
malicious attacks
LTLMoP platform
Linear Temporal Logic
Human Factors
Human behavior
GPS spoofing
game theory
control engineering computing
complex CPS
buffer-overflow
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
A Neighbor Trust-Based Mechanism to Protect Mobile Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:42pm
malicious attacks
manet privacy
temporal link
neighbor trust-based security scheme
neighbor trust-based mechanism
mobile network protection
Mobie ad hoc networks
malicious function
mobile nodes
Trust management
telecommunication security
Compositionality
Mobile communication
mobile ad hoc network
mobile ad hoc networks
MANET
Metrics
privacy
pubcrawl
Resiliency
biblio
Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems
Submitted by grigby1 on Fri, 10/30/2020 - 12:18pm
input-output programs
smart I/O modules
security of data
security
Scalability
Safety
runtime enforcement
Runtime
real-world physical systems
pubcrawl
programmable logic controller I/O modules
programmable controllers
production engineering computing
Power Grid
Monitoring
malicious attacks
control engineering computing
Industries
Industrial Control Systems
industrial control
i-o systems security
I-O Systems
hardware architecture
Hardware
embedded systems
embedded control
cyber-physical systems (CPSs)
cyber-physical systems
cyber-physical attacks mitigation
Cyber-physical attacks
CPS
control systems
biblio
A Reputation Management Framework for MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
pubcrawl
trusted mobile ad hoc networks
Trusted Computing
trust information
security of data
Resiliency
resilience
reputation system
reputation management system
attack
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs
manet privacy
malicious information
malicious attacks
Compositionality
1
2
3
4
next ›
last »