Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical security
biblio
Achieving Physical Security through K-Barrier Coverage in Three-Dimensional Stealthy Lattice Wireless Sensor Networks
Submitted by grigby1 on Tue, 04/19/2022 - 10:39am
3D sensor networks
3D space fillers
Belts
great rhombicuboctahedron
k-barrier coverage
Lattices
physical security
pubcrawl
resilience
Scalability
sensor security
simulation
Solid modeling
Stochastic processes
Three-dimensional displays
wireless sensor networks
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
Vertical Underwater Molecular Communications via Buoyancy: Gaussian Velocity Distribution of Signal
Submitted by aekwall on Mon, 12/21/2020 - 1:29pm
reliable delay-tolerant data link
downwards channels
Gaussian velocity spatial distribution
heavy propagation loss
high capacity data rates
Liquids
long range underwater vertical communication
MCvB channel
modulated symbols
molecular clusters
particle image velocimetry
dominant propagation force
sequential puffs
sequential symbols
sonar based carriers
statistical characteristics
statistical distribution
turbulent diffusion
underwater
velocity profile
vertical underwater molecular communications
viscous diffusion
acoustic coupling
Resiliency
Human behavior
pubcrawl
Reliability
Mathematical model
Stress
molecular communication
molecular communication (telecommunication)
telecommunication network reliability
Chemicals
Scalability
underwater acoustic communication
physical security
statistical distributions
defence
Buoyancy
buoyancy channel
buoyancy forces
covert delay-tolerant data link
current optical based carriers
biblio
Security Lock with Effective Verification Traits
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
speech pattern recognition
multilevel security system
multiple layer security system
physical security
Raspberry Pi microcomputers
recognition
security lock
security locker solution
smart box
multi-layer
Speech recognition
TensorFlow
vein pattern recognition
vein recognition
Veins
verification traits
Viola and Jones
pattern locks
pubcrawl
Scalability
authorisation
Linux
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
security
password
Cameras
Fingerprint recognition
face recognition
facial recognition
graphical user interfaces
interactive GUI
machine learning operations
biblio
Physical Protection of Lattice-Based Cryptography: Challenges and Solutions
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
composability
fault-injection attacks
lattice-based cryptography
Metrics
physical security
pubcrawl
quantum computing security
resilience
Resiliency
Scalability
side-channel analysis
biblio
A Framework for Data-Driven Physical Security and Insider Threat Detection
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
pubcrawl
organizational security policies
Organizations
physical security
physical security architecture
Physical Security Definition
policy-based governance
provenance graphs
PSO
ontologies (artificial intelligence)
resilience
risk management
rule-based anomaly detection
security of data
Security Ontology
Security Provenance
security provenance solution
security weaknesses
Human behavior
Anomaly Detection
Attack Pattern Reconstruction
data analysis
Data Analytics
data-driven physical security
Digital Forensics
forensic data analysis
Forensics
Access Control
insider threat
Insider Threat Detection
insider threats mitigation
intrusion attempts
Metrics
ontological framework
Ontologies
biblio
Physical security assessment with convolutional neural network transfer learning
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
security of data
physical security
physical security assessment
physical security system
physical security video data
pubcrawl
Resiliency
Scalability
security
Periodic retraining
Support vector machines
target detection
Training
Training data
transfer learning
video signal processing
visible imager data
artificial intelligence security
object recognition tasks
Object recognition
object detection
Nuisance Alarms
neural nets
Metrics
machine learning
learning (artificial intelligence)
human in the loop ground truth data
Human behavior
feature extraction
deep learning techniques
convolutional neural network transfer learning
convolutional neural network
Artificial Neural Networks
biblio
IoT Security Challenges and Ways Forward
Submitted by grigby1 on Mon, 04/03/2017 - 11:53am
composability
IoT security
Metrics
network control systems
network control systems security
networked control systems
physical security
pubcrawl
Resiliency
security
biblio
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach
Submitted by grigby1 on Mon, 04/03/2017 - 11:52am
composability
cyber security
Industrial Control Systems
Metrics
Oil and Gas cyber physical systems
Physical layer
physical layer security
physical security
physical-layer security
pubcrawl
Resiliency
Stackelberg Security Game
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
1
2
next ›
last »