Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication channels
biblio
Mitigating Physical Layer Attack in Cognitive Radio - A New Approach
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pubcrawl
Zadoff-Chu sequence
wireless channels
telecommunication security
spectrum sensing
sensors
Resiliency
resilience
replay attack
radio spectrum management
radio frequency spectrum
PUEA
authentication
primary user emulation attack
physical layer attack mitigation
Physical layer
OFDM
emulation
distance calculation
Correlation
Communication channels
Cognitive Radio Security
cognitive radio
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
exponential strong converse theorem
theoretical cryptography
Zinc
source coding
signal estimation
side channel-attacks
Shannon cipher system
secrecy bounds
Random variables
one helper source coding problem
information theory
information theoretical analysis
privacy
distributed sensors
Communication channels
bounded storage eavesdropper
Ciphers
side-channel attacks
Decoding
Compositionality
Cryptography
telecommunication security
composability
pubcrawl
biblio
Towards trustworthy data in networked control systems: A hardware-based approach
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
malfunctioning systems
trustworthy data
transferred data needs
telecommunication security
smart factories
security
Scalability
Resiliency
pubcrawl
process control
networked control systems
Networked Control System
NCS
captured sensor data
Loss measurement
hardware-based approach
forward error correction
encryption
encrypted data
denial-of-service attacks
delays
Cryptography
correct functionality
controlled process
Communication channels
biblio
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human behavior
telecommunication channels
set-theoretic control framework
set theory
Science of Security
Scalability
resilient control
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
internet
Human Factors
actuators
FDI attacks
encryption algorithms
Detectors
cyber-physical systems
cyber false data injection attacks
Cryptography
control remediation strategy
composability
Communication channels
collaboration
anomaly detector module
biblio
The Role of Lightweight Approaches Towards the Standardization of a Security Architecture for IoT Middleware Systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
middleware
telecommunication channels
standardization
standardisation
security architecture
security
Resiliency
pubcrawl
network security
border API
IoT middleware systems
Internet of Things
device abstraction
data management
computer network security
composability
Communication channels
collaboration
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism
biblio
Security applications challenges of RFID technology and possible countermeasures
Submitted by BrandonB on Thu, 04/30/2015 - 2:17pm
Product Code
wireless technology
warfare machinery
telecommunication security
security
RFID tag
RFID reader
RFID
radiofrequency identification
product code technology
antennas
Management
ISO standards
Intelligent systems
integrated circuits
information technology
information and communication technology
ICT
frequency allocation
Communication channels
« first
‹ previous
1
2
3