Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
Matrices From Topological Graphic Coding of Network Security
Submitted by grigby1 on Fri, 09/18/2020 - 12:47pm
Topology
vertex splitting operations
Topsnut-gpws
Topological graphic coding
topological coding matrices
topcode-matrices
splitting labellings
mathematical models
encrypted networks
edge splitting operations
coding theory
Labeling
Cryptography
graph theory
password
Compositionality
Metrics
network security
encoding
matrix algebra
Resiliency
resilience
pubcrawl
security
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 10:37am
Systematics
untrusted device
towards systematic design
Systematic Design
single-device RA
single device
remote exploits
prior collective RA schemes
place collective RA
networked embedded devices
embedded system security
concrete collective RA scheme
collective remote attestation protocols
Collective Remote Attestation
remote device
data privacy
malware detection
Topology
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Software
Protocols
performance evaluation
security
Hardware
attestation
biblio
Node Copying for Protection Against Graph Neural Network Topology Attacks
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
Topology
similarity structure
semi-supervised learning
prediction capability
node copying
graph topology
graph neural network topology attacks
graph convolutional networks
graph based machine
downstream learning task
detection problem
deep learning models
corruption
attack graphs
graph connectivity
Predictive Metrics
security of data
adversarial attacks
network topology
network theory (graphs)
Training
Prediction algorithms
Neural networks
neural nets
Computational modeling
graph theory
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET
Submitted by aekwall on Mon, 07/13/2020 - 10:20am
BayesTrust
Web page ranking algorithms
vehicular ad hoc network
VehicleRank
untrusted nodes
threat models
social trust relationship
random topology
pagerank
local trust relationships
local trust information
IWOT-V
implicit Web of trust
global trust relationships
explicit link structure
cooperative intelligent transport system
telecommunication security
web of trust
Intelligent Transportation Systems
Web pages
trust model
telecommunication network topology
mobile ad hoc networks
Topology
VANET
Computational modeling
Social network services
Peer-to-peer computing
vehicular ad hoc networks
composability
pubcrawl
Resiliency
biblio
Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain
Submitted by aekwall on Mon, 06/29/2020 - 11:56am
collaborative DDoS mitigation architecture
Topology
smart contracts
DDoS Attack
contracts
smart contract
private blockchain
software-defined networking
autonomous systems
SDN
DDoS
DDoS Prevention Service
distributed denial of service attack
DPS
network threat
Soft Defined Network
DDoS attack mitigation
Human behavior
computer network security
IP networks
telecommunication traffic
Cryptography
telecommunication security
security
software defined networking
Resiliency
Computer crime
pubcrawl
composability
Peer-to-peer computing
Metrics
blockchain
Distributed databases
network topology
biblio
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
Sun
efficient hash-tree-based algorithm
hash tree efficiency
hash-tree based mining
hash-tree search method
mining efficiency
network physical connection data
sequential mining algorithm
sequential pattern mining
association rules
topology constraint
topology relation
topology structure
transmission network
transmission networks
warning Weblogs
hash algorithms
Pattern recognition
Resiliency
pubcrawl
internet
Business
trees (mathematics)
Data mining
network topology
network nodes
Conferences
Topology
telecommunication network topology
Compositionality
Hash functions
hash tree
tree searching
alarm association rules
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
An Evolutionary Computation Approach for Smart Grid Cascading Failure Vulnerability Analysis
Submitted by grigby1 on Fri, 04/24/2020 - 3:38pm
benchmark systems
Power Grid Vulnerability Assessment
smart grid security
smart grid protection
smart grid cascading failure vulnerability analysis
Reinforcement learning
power transmission reliability
power transmission protection
power transmission lines
particle swarm optimization
particle swarm optimisation
line-switching sequential attack
line-switching
evolutionary computation based vulnerability analysis framework
evolutionary computation
Cascading Failures
learning (artificial intelligence)
Power system protection
power system faults
failure analysis
Metrics
Smart Grids
composability
smart power grids
power system security
power engineering computing
cyber-physical security
Topology
Resiliency
resilience
pubcrawl
security of data
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »