Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
SSH brute force attack mitigation in Internet of Things (IoT) network : An edge device security measure
Submitted by grigby1 on Thu, 05/05/2022 - 4:33pm
composability
Force measurement
edge detection
username
Raspberry Pi
Image edge detection
Force
password
Metrics
Intrusion Detection System (IDS)
Internet of Things
authentication
Protocols
Scalability
Resiliency
resilience
pubcrawl
Intrusion Detection
security
biblio
An Efficient Color Image Security Technique for IOT using Fast RSA Encryption Technique
Submitted by grigby1 on Thu, 05/05/2022 - 3:12pm
IoT
efficient encryption
Secure Force (SF)
Keywords Color Image encryption
Histogram
cyber physical system security framework
filtering algorithms
cyber physical systems
RSA
Color
Image color analysis
security
visualization
Force
Robustness
composability
Entropy
Cryptography
Resiliency
resilience
pubcrawl
biblio
A Scene-Driven Modeling Reconfigurable Hardware-in-Loop Simulation Environment for the Verification of an Autonomous CPS
Submitted by grigby1 on Wed, 04/20/2022 - 9:50am
hardware-in-loop simulation
Visual object
simulation
Scene-driven
Resiliency
resilience
Reconfigurable
pubcrawl
modeling
Metrics
Mathematical model
Atmospheric modeling
Force
Equations
Data models
cyber-physical system
CPS Simulation
CPS modeling
computer architecture
Computational modeling
composability
biblio
Experimental Evaluation of Security Monitoring and Notification on Network Intrusion Detection System for Server Security
Submitted by grigby1 on Mon, 04/18/2022 - 2:35pm
Force
Human behavior
Network
network intrusion detection
policy-based governance
Protocols
Prototypes
pubcrawl
real-time systems
resilience
Resiliency
security
security weaknesses
Servers
server security
biblio
Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework
Submitted by grigby1 on Mon, 04/18/2022 - 10:51am
Automatic Mapper
Data Model Mapper
Data models
Force
Generators
I2NSF
internet
network security
performance evaluation
policy-based governance
Policy Translation
Production
pubcrawl
security policies
biblio
Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments
Submitted by aekwall on Wed, 04/13/2022 - 10:15am
Damage Assessment
Force
IEC standards
Industry 4.0
Instruments
IT / OT convergence
Measurement
OT Security
Production facilities
pubcrawl
Resiliency
Safety
security
Threat Modeling
biblio
Bypassing memory safety mechanisms through speculative control flow hijacks
Submitted by aekwall on Mon, 03/14/2022 - 1:35pm
programming
rop attacks
Transient Execution
Speculative ROP
side channels
operating system security
Memory Safety Mechanisms
Buffer overflows
Computer bugs
Runtime
Force
process control
composability
Resiliency
Scalability
pubcrawl
Human Factors
Hardware Security
Software
biblio
A Secure Multi Factor User Authentication Framework for Electronic Payment System
Submitted by grigby1 on Wed, 03/09/2022 - 1:40pm
Metrics
two
single factor
Electronic payments
Multi-factor authentication
multifactor authentication
Force
password
Reliability
security
authorization
security issues
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Nearest Neighbor Search In Hyperspectral Data Using Binary Space Partitioning Trees
Submitted by grigby1 on Tue, 03/08/2022 - 2:52pm
Atmospheric measurements
vp-tree
Spectral Information Divergence
Spectral Angle Mapper
hellinger distance
binary space partitioning trees
Bhattacharyya Angle
Nearest neighbor methods
Particle measurements
pubcrawl
ball-tree
Measurement
nearest neighbor search
Euclidean distance
Force
Signal processing algorithms
Metrics
data structures
biblio
Three-Pass Protocol Scheme for Securing Image Files Using the Hill Cipher 3x3 Algorithm
Submitted by grigby1 on Mon, 01/10/2022 - 12:18pm
Protocols
Three-Pass Protocol
System testing
Software algorithms
Scalability
Resiliency
resilience
Receivers
pubcrawl
android encryption
Metrics
Java
Human behavior
Hill Cipher
Force
Cryptography
Ciphers
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »