Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication channels
biblio
Adaptive control of bilateral teleoperation systems with false data injection attacks and attacks detection
Submitted by grigby1 on Fri, 07/21/2023 - 2:41pm
False Data Detection
Packet loss
least squares
Bilateral Teleoperation System
Asymptotic stability
sufficient conditions
Attack detection
Resiliency
false data injection attacks
Adaptation models
Communication channels
Distributed databases
Stability analysis
resilience
composability
Data models
Human behavior
pubcrawl
biblio
Security Platoon Control of Connected Vehicle Systems under DoS Attacks and Dynamic Uncertainty
Submitted by grigby1 on Tue, 07/11/2023 - 2:17pm
simulation
Security Control
Platoon control
Dynamic uncertainty
Dynamical Systems
Communication channels
connected vehicles
Markov processes
Stability analysis
pubcrawl
uncertainty
DoS attacks
composability
Protocols
Resiliency
resilience
Metrics
biblio
Security Foundations for Application-Based Covert Communication Channels
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
resilience
privacy-enhancing technologies
censorship
and censorship
Resiliency
Security Foundations
Communication channels
anonymity
covert channels
security
Syntactics
Compositionality
cognition
Protocols
privacy
Scalability
pubcrawl
biblio
Improving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation
Submitted by grigby1 on Thu, 10/06/2022 - 3:21pm
information science
Packet header manipulation
network steganography
covert channels
Resiliency
network protocols
Communications technology
Communication channels
Steganography
pubcrawl
Named Data Network Security
resilience
Receivers
Protocols
internet
Scalability
Human Factors
Human behavior
biblio
Practical Principle of Least Privilege for Secure Embedded Systems
Submitted by grigby1 on Tue, 08/02/2022 - 4:21pm
embedded systems
Resiliency
composability
Metrics
Communication channels
control systems
Linux
pubcrawl
real-time systems
resilience
security
Synchronization
Trustworthy Systems
biblio
Energy-Efficient Friendly Jamming for Physical Layer Security in Visible Light Communication
Submitted by aekwall on Tue, 05/10/2022 - 1:44pm
Conferences
pubcrawl
Scalability
Metrics
Resiliency
physical layer security
light emitting diodes
Interference
Energy Efficiency
Transmitters
Communication channels
precoding
Jamming
VLC
Visible Light Communications Security
biblio
Adaptive RF Fingerprint Decomposition in Micro UAV Detection based on Machine Learning
Submitted by grigby1 on Fri, 04/22/2022 - 1:16pm
Communication channels
time-varying RF signal
RF signals
RF Fingerprint
Micro UAS Detection
Empirical mode decomposition
EEMD
decomposition
EMD
feature extraction
Compositionality
Metrics
Fingerprint recognition
composability
Radio frequency
pubcrawl
machine learning
biblio
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
Submitted by grigby1 on Tue, 04/19/2022 - 4:42pm
Ciphertext Policy ABE
Communication channels
Computational modeling
Costs
CP-ABE
encryption
information security
Internet of Things
outsourced decryption
outsourcing
Pairing-Free
policy-based governance
pubcrawl
revocation
Scalability
standards
biblio
Combating DDoS Attacks with Fair Rate Throttling
Submitted by aekwall on Mon, 03/14/2022 - 1:45pm
collaboration
Mathematical model
internet
pubcrawl
Resiliency
DoS
DDoS
resource management
Predictive Metrics
denial-of-service attack
process control
Communication channels
Rate Adjustment
Router Throttle
Router Systems Security
biblio
ADobf: Obfuscated Detection Method against Analog Trojans on I2C Master-Slave Interface
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
obfuscation
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Sensitivity
Resistors
Resiliency
resilience
pubcrawl
Communication channels
Master-slave
I2C
hardware trojan
Hardware
cyber physical systems
cyber physical security
composability
analog Trojan
Clocks
1
2
3
next ›
last »