Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious attacks
biblio
Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
malicious attacks
telecommunication security
static analysis
smartphone apps
smart phones
Semantics
semantic analysis
security
Resiliency
pubcrawl
multiple layered security analyses method
Androids
internet
Humanoid robots
dynamic analysis
cryptocurrency exchangers
cryptocurrency exchange servicers
cryptocurrency
cryptocurrencies
Cross Layer Security
composability
business trading
biblio
An Internet Medical Care-Oriented Service Security Open Platform
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
convenient online services
Autonomic Security
Visualized Control
standardized connection process
Service
Security Open Platform
personal privacy data security
medical data illegal stealing
Internet medical care-oriented service security open platform
Internet hospitals
Internet Hospital
data access process
security of data
Data Security
malicious attacks
medical information systems
health care
internet
composability
pubcrawl
Resiliency
data privacy
Big Data
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
A highly accurate machine learning approach for developing wireless sensor network middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:47am
middleware security
WSNs
WSN
wireless sensor networks
wireless sensor network middleware
visualization
unsupervised learning technique
Unsupervised Learning
sensors
security problems
security of data
security
Resiliency
resilience
pubcrawl
policy-based governance
composability
middleware
malicious attacks
machine learning
learning (artificial intelligence)
intelligent middleware
Generators
generator
Generative Adversarial Networks algorithm
GANs
gan
Gallium nitride
fake data
detector
Data Transmission
confusion matrix
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
inter-cluster communication
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
malicious attacks
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
Metrics
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Monitoring
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity
Submitted by aekwall on Mon, 10/28/2019 - 10:39am
provenance-based trust reasoning
data science
Data validity
data-intensive science and engineering
Knowledge engineering
knowledge provenance
malicious attacks
natural environmental changes
operations mistakes
cognitive systems
SCI failures
scientific computing integrity
scientific workflows
Variety
Veracity
Viewpoints
views
Scientific Computing Security
trust
Big Data
Conferences
data integrity
Trusted Computing
Resiliency
pubcrawl
graph theory
Computational modeling
security of data
provenance graphs
cognition
Semantics
inference mechanisms
Predictive Metrics
data provenance
scientific information systems
Compositionality
« first
‹ previous
1
2
3
4
next ›
last »