Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information technologies
biblio
Resilience Enhancement through a Multi-agent Approach over Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:11pm
IPv6 test-bed
ubiquitous computing
tangible physical world
sensors
Resiliency
resilience enhancement
resilience
pubcrawl
physical disturbances
multiagent framework
multiagent approach
multi-agent systems
Monitoring
middleware
actuators
IP networks
information technology
information technologies
distributed devices
cyber-physical systems
cyber vulnerabilities
cyber space perspective
cyber physical systems
CPS resilience
control systems
computer architecture
communication platforms
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 9:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 10:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
spread spectrum systems
primary security threat
probability
radio interference broadcast
radio networks
radiofrequency interference
Receivers
Smart Grid
smart grid application
smart grid communication
Smart Grids
smart power grids
power system security
TACT
telecommunication security
telecommunication traffic
transmitting adaptive camouflage traffic
U-shaped function
well-adopted attack model
wireless communication security
wireless network deployment
wireless networks
worst-case message delay
Jamming
code channel
Communication system security
control messages
cyber-physical system
delay performance guarantee
delays
existing attack model
generic jamming process
information exchange
information technologies
camouflage traffic
jamming attack
jamming attacks
jamming resilience
latency guarantee
message delay minimization
multiple-frequency channel
network load balance
network traffic load
Power distibution
power infrastructures