Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security mechanisms
biblio
Mining Large Data to Create a Balanced Vulnerability Detection Dataset for Embedded Linux System
Submitted by grigby1 on Thu, 07/13/2023 - 3:31pm
composability
secure software
Embedded System
Balanced Dataset
operating system
vulnerability detection
Resiliency
smart cities
Smart homes
Linux
Training
security mechanisms
Protocols
embedded systems
Safety
resilience
Metrics
pubcrawl
cyber security
biblio
A HES for Low Speed Processors
Submitted by grigby1 on Thu, 05/20/2021 - 11:55am
Program processors
white box cryptography
HES
DES
decryption
security services
Robustness
Task Analysis
Memory management
Ciphers
composability
standards
security mechanisms
Resiliency
resilience
Metrics
pubcrawl
encryption
biblio
Through the Lens of Code Granularity: A Unified Approach to Security Policy Enforcement
Submitted by grigby1 on Thu, 04/29/2021 - 2:16pm
automata
Communication networks
Conferences
enforcement
Java
Monitoring
Policies
policy-based governance
pubcrawl
Runtime
security
security mechanisms
security policies
biblio
User detection of threats with different security measures
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Insurance
User behavior
signal detection
security settings
security of data
security mechanisms
security measures
security
risk-related behaviors
pubcrawl
Particle measurements
optimal investment
online experiment
maximal investment
investment decisions
Investment
alerting system
IDS
Human Factors
human decisions
Human behavior
fourth condition
Decision Making
Cybersecurity
cyber security system design
Cyber Insurance
Cyber Attacks
computer security
Atmospheric measurements
associated costs
Alerting systems
biblio
Development of security mechanisms for a remote sensing system based on opportunistic and mesh networks
Submitted by aekwall on Mon, 03/01/2021 - 4:44pm
remote sensing
wireless sensor networks
wireless mesh networks
Wireless Mesh Network Security
telecommunication security
sensor node
security mechanisms
security mechanism development
Resiliency
remote sensing system
composability
remote environment monitoring system
pubcrawl
Opportunistic Networks
opportunistic network
Metrics
Mesh networks
MESH network
environment monitoring system
biblio
DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
generci adversary model
specific attack algorithm
security-by-design
security mechanisms
secure design paradigm
pubcrawl
Optimal Defense
Metrics
Human behavior
CPS Modeling and Simulation
designing actuators to resist arbitrary attacks
DARIA
cyber-physical systems
computer network security
actuator security
Predictive Metrics
composability
Resiliency
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
radar detection
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
Transmission line measurements
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
sensors
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
Intrusion Detection
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
biblio
Natural Language Processing and Deep Learning Towards Security Requirements Classification
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
Resiliency
Task Analysis
software engineering community
software engineering
Software
security requirements classification
security of data
security mechanisms
security
Scalability
deep learning
Recurrent neural networks
pubcrawl
pattern classification
natural language processing
machine learning techniques
machine learning
learning (artificial intelligence)
Human behavior
1
2
3
4
next ›
last »