Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threats
biblio
Review of jamming attack using game theory
Submitted by grigby1 on Fri, 10/26/2018 - 4:04pm
malicious attack nodes
WSN
wireless sensor networks
Wireless Sensor Network
wireless networks
timing channel
telecommunication security
security threats
security
Scalability
pubcrawl
power expenditure
network load
Metrics
external attack
jamming technique
jamming detection
jamming attack
Jamming
internal attack
interaction model
information preservation
Human Factors
Games
game theory
game theoretic strategies
game theoretic security
game theoretic representation
biblio
Security risk assessment of the PeopleBot mobile robot research platform
Submitted by grigby1 on Wed, 09/12/2018 - 10:13am
Resiliency
WiFi
ubiquitous computing
Service robots
security threats
security risk assessment
security of data
security access
security
robots
robotic systems
Robot sensing systems
risk management
collision avoidance
resilience
remote accessing
remote access service
pubcrawl
PeopleBot mobile robot research platform
mobile robots
mobile robot platform
internet
Ethernet
Damage Assessment
critical missions
control
biblio
Privacy Flag: A Crowdsourcing Platform for Reporting and Managing Privacy and Security Risks
Submitted by grigby1 on Wed, 05/30/2018 - 2:57pm
Collective Intelligence
crowdsourcing
Human behavior
Human Factors
Metrics
privacy risks
pubcrawl
resilience
Resiliency
Scalability
Security Risk Management
security threats
biblio
Malware Detection for Secure Microgrids: CoSSMic Case Study
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Microgrids
vulnerability detection
SmartGrid
smart-devices
security vulnerability
security threats
security
sandbox
Resiliency
pubcrawl
Protocols
power system security
power engineering computing
performance evaluation
Monitoring
Compositionality
microgrid ecosystem
microgrid
Metrics
malware detection
malware
invasive software
Human behavior
energy infrastructure
electric microgrids
distributed power generation
Cybersecurity
cyber vulnerabilities
CoSSMic project
biblio
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
mobile computing
Static and Dynamic Analysis of Apps
static analysis
source code
security threats
security of data
security
Resiliency
resilience
Repackaging
Registers
reflection
pubcrawl
program diagnostics
obfuscated Android applications
Mobile Security
Android (operating system)
malware
Java
HyDroid
hybrid approach
Humanoid robots
dynamic analysis
Compositionality
application services
application program interfaces
APIs
API call trace generation
Androids
Android applications
Android API call traces
Android API
biblio
An enhanced security framework of software defined network based on attribute-based encryption
Submitted by grigby1 on Wed, 02/21/2018 - 12:43pm
Access Control
computer architecture
encryption
fine-grained access control
network security
Network Security Architecture
pubcrawl
resilience
Resiliency
security threats
Software Defined Network
software defined networking
Switches
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
Inferring OpenFlow Rules by Active Probing in Software-Defined Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:05pm
delays
Receivers
Reconnaissance
Resiliency
rule inference
security threats
software defined networking
Software-Defined Networks
telecommunication security
active probing
Apriori algorithm
clustering
control systems
controllers
reactive rules
Denial-of-Service
DoS attacks
inferring sdn by probing and rule extraction
INSPIRE
IP networks
k-means clustering
Network reconnaissance
OpenFlow rules
packet delay time
Probes
Probing
probing packets
pubcrawl
biblio
Adaptable Safety and Security in V2X Systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
security threats
performance limitation threats
pubcrawl
Resiliency
road safety
road traffic
Roads
Safety
security
network conditions
simple V2V highway scenario
telecommunication security
telecommunication traffic
traffic efficiency
V2X systems
vehicular ad hoc networks
Wireless communications
adaptability
mobile computing
Metrics
maximum safety
Internet of Vehicles
internet
infotainment
Human Factors
Human behavior
dynamic adaptability approach
cyber physical systems
connected vehicles
Brakes
automobiles
authentication
adaptive safety/security approach
biblio
Collaborative security attack detection in software-defined vehicular networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
security attacks
wireless communication technologies
Wireless communication
vehicular environment
vehicular ad hoc networks
VANET
V2X communication
Training
Support vector machines
support vector machine
software-defined vehicular networks
Software-defined vehicular cloud
software defined networking
short connection time
security threats
security mechanism
Ad Hoc Network Security
security
safety services
Safety
Resiliency
pubcrawl
multiclass support vector machine
Human Factors
Human behavior
computer network security
composability
Communication system security
communication devices
collaborative security attack detection mechanism
collaboration
automotive industry
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »