Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
biblio
A Secure Voice Channel using Chaotic Cryptography Algorithm
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
secure voice channel
communicaiton channel prototype
decryption process
encrypted channel
encryption process
encryption-decription cycle
FPGA Spartan-3
high processing speed
nonecrypted channel
Cipher feedback mode
secure voice communications channel
secured channel
secured communication channel
Spartan-3 FPGA board
time 202.0 mus
unwanted eavesdropping
voice communication
voice messages
Ciphers
Cryptography
encryption
Receivers
telecommunication security
eavesdropping
Resiliency
pubcrawl
composability
field programmable gate arrays
Predictive Metrics
chaotic communication
asynchronous communication
chaotic cryptographic algorithm
chaotic cryptography
chaotic cryptography algorithm
chiper feedback
biblio
Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
Multi-user
Trapdoor indistinguishability
simulation program
Servers
security
secure multiuser multikeyword searchable encryption scheme
searchable encryption server
Resiliency
resilience
Receivers
random oracle model
public key cryptography
Public key
pubcrawl
privacal data
searchable encryption
multi-keyword
Indexes
encryption workload
encryption
decisional Diffie-Hellman
data user
data privacy
data owner
Cryptography
composability
cloud storage
Cloud Computing
cipher text keyword
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 10:47am
secure communication links
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
message transmission
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
OpenFlow
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
computer network security
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
Distributed Trust-Based Multiple Attack Prevention for Secure MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:19am
Ad hoc networks
composability
cyber physical systems
Data models
distributed trust
Intrusion Detection
MANET
manet attack prevention
Metrics
mobile computing
Multiple Attacks
network security
Probes
Receivers
Resiliency
Steady-state
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 11:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »