Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threats
biblio
Keyword-driven security test automation of Customer Edge Switching (CES) architecture
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
pubcrawl
automated test framework
automation
CES protocol designers
computer architecture
computer network security
customer edge switching architecture
internet
Internet architecture
keyword driven security test automation
keyword-driven testing
multidomain communications
protocol validation
Protocols
testing
Resiliency
Resilient Security Architectures
robot framework
robots
security
security threats
signalling protocols
Software
STRIDE analysis
telecommunication equipment testing
telecommunication traffic
test automation
biblio
Product authentication using hash chains and printed QR codes
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Protocols
statically printed QR codes
static tag based hash chains
static code
Servers
security threats
security characteristics
RFID tags
Resiliency
QR codes
pubcrawl
authentication
production engineering computing
product authentication
printed tags
hash-chain
cyber physical systems
Cryptography
counterfeit goods
cost-efficient scheme
Computer crime
biblio
Statesec: Stateful monitoring for DDoS protection in software defined networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:27pm
Metrics
Statesec
stateful monitoring
Software Defined Networks
software defined networking
security threats
SDN
Resiliency
pubcrawl
process control
Ports (Computers)
network management
Monitoring
composability
IP networks
in-switch processing
Human behavior
entropy-based algorithm
distributed denial of service
DDoS protection
DDoS attack mitigation
DDoS attack detection
control systems
computer network security
Computer crime
biblio
Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
intrusion prevention
Training
threat model
Threat Index
security threats
security of data
security issues
security
Resiliency
pubcrawl
Protocols
privacy
IoT-based CPS
IoT based CPHS
intrusion tolerance
Byzantine replication
Intrusion Detection
Internet of Things
Indexes
human participation
human involvement
human elements
holistic framework
cyber-physical systems
cyber-physical human systems
CPHS environment
composability
collaborative attacks
collaboration
biblio
Integration of wireless sensor network and Web of Things: Security perspective
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
Logic gates
sensor security
WSN integration
WoT security issue
Web of Things
smart thing
Sensor
security perspective
Security Challenge
Internet of Things vision
WSN
security threats
control systems
wireless sensor networks
Wireless Sensor Network
security
Wireless communication
computer network security
Computer crime
data privacy
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
Security in software-defined wireless sensor networks: Threats, challenges and potential solutions
Submitted by grigby1 on Wed, 12/20/2017 - 12:01pm
control systems
sensor security
WSN
water resources
tools
software-defined wireless sensor network
software-defined networking approach
security threats
SDWSN security
SDWSN
SDN paradigms
SD-WSN
real-time systems
Internet of Things paradigm
IoT
authorization
wireless sensor networks
computer network security
composability
SDN
Human Factors
software defined networking
Human behavior
Resiliency
pubcrawl
security
Metrics
biblio
A Scalable Threats Classification Model in Information Systems
Submitted by grigby1 on Thu, 04/20/2017 - 11:42am
information security
Network reconnaissance
pubcrawl
Resiliency
security dimension
security perspective
security risk
security threats
threat classification
biblio
Analysis on Manipulation of the MAC Address and Consequent Security Threats
Submitted by grigby1 on Thu, 04/20/2017 - 11:42am
countermeasure
hardware unique information
MAC address
Network reconnaissance
pubcrawl
Resiliency
security threats
biblio
Flooding attacks detection in MANETs
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
MANET
traffic generation
telecommunication traffic
statistical analysis
security threats
RREQ flooding attacks
Routing protocols
Routing
route discovery
pubcrawl170109
mobile ad hoc networks
Ad hoc networks
IP networks
flooding attack detection
DoS
denial of service
computer networks
computer network security
Computer crime
AODV
ah hoc on-demand distance vector
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 11:25am
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »