Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security attack
biblio
Security Attacks on Multi-Stage Proof-of-Work
Submitted by grigby1 on Fri, 07/15/2022 - 11:59am
Metrics
Pervasive Computing Security
selfish mining
Proof-of-work
multi-stage
profitability
incentive compatibility
security attack
pervasive computing
bitcoin
security
blockchain
Protocols
Scalability
Conferences
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
mobile nodes
Throughput
threshold-based black hole attack prevention method
telecommunication security
security attack
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile radio
AODV
mobile ad hoc networks
mobile ad hoc network
Metrics
manet privacy
MANET
malicious node
IP networks
fake routing information
data packets
Compositionality
Black hole attack
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
internet
streaming bots attack
Streaming bots
Servers
security attacks
security attack
screenlogger
replay attack
pubcrawl
phishing attack
password-guessing attack
password
one time password
message authentication
keylogger
authentication
Intelligent captcha technique
Intelligent Authentication Scheme
Human behavior
hardware-independent Authentication Scheme
Hardware
denial of service
Cryptography
Cryptographic Protocols
computer network security
Computer crime
composability
Cloud Computing
captchas
CAPTCHA
biblio
A Methodical Overview on Phishing Detection along with an Organized Way to Construct an Anti-Phishing Framework
Submitted by grigby1 on Tue, 11/26/2019 - 2:47pm
pubcrawl
machine learning
personal information
Phishing
phishing approaches
phishing attack
Phishing Detection
phishing Websites
phishy URL
internet
security and privacy
security attack
tools
Uniform resource locators
unsolicited e-mail
Web sites
website features
credit card details
Anti Phishing Working Group
Anti-phishing
Anti-Phishing framework
anti-phishing model
Banking
blacklisting
classification
Computer crime
account details
emails
feature extraction
Google
HTTPs
Human behavior
human factor
in-use anti-phishing tools
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
Security Attacks on Information Centric Networking for Healthcare System
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
Medical services
wireless sensor networks
security of data
security framework
security attack
security
Resiliency
resilience
pubcrawl
Protocols
patient monitoring
patient health condition monitoring
Monitoring
Metrics
actuator security
medical information systems
IP networks
Internet of Things
internet
information centric networking
ICN
Human behavior
healthcare system
health care system
health care
e-healthcare monitoring service
composability
biomedical data communication security
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
biblio
Security function virtualization in software defined infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SAVI SDI testbed
Whales
VNF
virtualized network function
virtualisation
software defined networking
software defined infrastructure
Software
Servers
security solution
security function virtualization
security attack
security
Bandwidth
pubcrawl170114
OPEX
network intrusion detection and prevention
IP networks
Inspection
honey-pot
DPI system
deep packet inspection system
computer network security
capital and operational expense
CAPEX
1
2
next ›
last »