Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
Securing Data Communication Through MQTT Protocol with AES-256 Encryption Algorithm CBC Mode on ESP32-Based Smart Homes
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
privacy
Smart homes
Smart Home
Scalability
Resistance
Resiliency
resilience
pubcrawl
Protocols
AES
MQTT protocol
Metrics
Internet of Things
Human behavior
Force
Esp32
encryption
android encryption
biblio
Thrust Force Ripple Optimization of MEMS Permanent Magnet Linear Motor Based on Harmonic Current Injection
Submitted by grigby1 on Mon, 12/20/2021 - 1:18pm
Magnetic flux
thrust ripple
Resiliency
resilience
pubcrawl
permanent magnet
Micromechanical devices
Metrics
MEMS
Air gaps
Linear motor
Induction motors
Human behavior
harmonic injection
Harmonic analysis
Force
dynamics
composability
biblio
A Deep Exploration of BitLocker Encryption and Security Analysis
Submitted by grigby1 on Mon, 11/29/2021 - 2:11pm
pubcrawl
VMK
unlock password
Universal Serial Bus
System recovery
Security analysis
Resiliency
resilience
recovery key
BitLocker encryption
password
Partitioning algorithms
Hard disks
Force
external key
encryption
Dictionaries
biblio
Network Security System on Multiple Servers Against Brute Force Attacks
Submitted by grigby1 on Tue, 07/27/2021 - 12:30pm
Monitoring
Servers
Security by Default
security
Scalability
Resiliency
resilience
pubcrawl
network security
DDoS Attack Prevention
IP networks
IDS
IDPS
Force
Fail2ban
Databases
Communication networks
biblio
Combination RSA with One Time Pad for Enhanced Scheme of Two-Factor Authentication
Submitted by grigby1 on Thu, 07/08/2021 - 3:38pm
authentication
decryption
encryption
Force
Human behavior
Human Factors
One Time Pad
pubcrawl
Public key
Resistance
Robustness
RSA
security
two factor authentication
two-factor authentication
biblio
Improved MODLEACH with Effective Energy Utilization Technique for WSN
Submitted by grigby1 on Tue, 06/01/2021 - 2:51pm
privacy
WSN
wireless sensor networks
Throughput
security
Resiliency
resilience
Residual energ
remote sensing
pubcrawl
Base stations
MODLEACH
LZW Compression
LEACH
Force
confinement
composability
clustering
batteries
biblio
Perspectives on the future of cybersecurity education
Submitted by grigby1 on Tue, 05/25/2021 - 2:33pm
privacy
pubcrawl
Guidelines
internet
computer security
Force
cybersecurity education
cyber physical systems
Accreditation
accreditation criteria
cybersecurity engineering
undergraduate computing programs
cyber education
biblio
Design and Implementation of NIDS Notification System Using WhatsApp and Telegram
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
notification platform
whatsapp
Telegram
telecommunication traffic
SYN flood attacks
SSH brute force attacks
social networking (online)
Social network services
Snort
Servers
security of data
real-time systems
pubcrawl
policy-based governance
packet data traffic
administrator
Notification
NIDS notification System
NIDS
network intrusion detection system
IP networks
Intrusion Detection
Human Factors
Human behavior
Force
Floods
Death attacks
brute force attacks
attack time
attack port
biblio
Distributed Transform Encoder to Improve Diffie-Hellman Protocol for Big Message Security
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
Human behavior
security
Public key
pubcrawl
Protocols
policy-based governance
Main in the Middle Attack
Long Messages Encryption
Human Factors
Brute Force Attack
Hash functions
Force
encryption
distribution transforming encoder
Diffie-Hellman protocol
Cryptography
brute force attacks
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »