Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Handheld computers
biblio
Cyber-Resilience Enhancement of PMU Networks Using Software-Defined Networking
Submitted by grigby1 on Mon, 11/29/2021 - 1:12pm
Communication networks
Cyber-security
grid resilience
Handheld computers
Observability
Phasor Measurement Unit
Phasor measurement units
Power measurement
power systems
pubcrawl
resilience
Resiliency
Smart Grids
software-defined networking
System recovery
biblio
Mitigation of Tampering Attacks for MR-Based Thermal Sensing in Optical NoCs
Submitted by aekwall on Thu, 09/30/2021 - 10:43am
Resiliency
Very large scale integration
Trojan horses
trojan
Thermal sensors
thermal sensing
tampering attack
security
Scalability
Handheld computers
pubcrawl
Optical sensors
network-on-chip
network on chip security
micro-ring resonator
Metrics
Hardware Security
biblio
Intrusion Detection and Prevention System Using Cuckoo Search Algorithm with ANN in Cloud Computing
Submitted by grigby1 on Wed, 09/08/2021 - 8:35am
Human behavior
Servers
Resiliency
resilience
pubcrawl
PDR (Packet Delivery Ratio)
Metrics
Intrusion Detection
IDS (Intrusion Detection System)
ANN (Artificial Neural Network)
Handheld computers
energy consumption
delays
DDoS Attack Prevention
cuckoo search algorithm
composability
Cloud Computing
Artificial Neural Networks
biblio
Group Key Management in Cloud for Shared Media Sanitization
Submitted by grigby1 on Tue, 02/16/2021 - 12:24pm
Data Sanitization
security
resilience
Remote Key Management Services
pubcrawl
privacy
Media
Key Management Services
Handheld computers
grid computing
encryption
key management
Crypto Shredding
Compositionality
Cloud Security
cloud computing security
Cloud Computing
Client-side Key Management Services
Human behavior
Metrics
Resiliency
Scalability
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 10:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 10:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
Mobile impromptu systems
wireless gadget connections
Wireless communication
transport protocols
telecommunication traffic
Technological innovation
TCP-IP
steering conventions
self arranging system
Resiliency
resilience
pubcrawl
protocol
policy-based governance
pervasive computing
Base stations
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
IPV6 systems
ipv6 security
IPv6 MANET
IPv4 MANET
IP networks
Handheld computers
computer network security
composability
Communication system security
collaboration
1
2
3
next ›
last »