Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security mechanisms
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
biblio
Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
Monitoring
tools
telecommunication traffic
sensitive information
security mechanisms
security
Scalability
resource limitations
Resiliency
resilience
Protocols
privacy
network intrusion detection
network attacks
signature based defense
IP networks
IP flow properties
IoT devices
IoT communications
Intrusion Detection Systems
Intrusion Detection
Internet of Things
internet
flow monitoring
defense mechanisms
computer network security
attack signature
pubcrawl
biblio
Applied Layered-Security Model to IoMT
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
layered-security
wearables security
Wearable Device
Ubiquitous Computing Security
security threats
security of data
security mechanisms
Scalability
Resiliency
pubcrawl
privacy
Metrics
Medical services
medical field
layered-security model
data privacy
IoT
IoMT
Internet of Things
internet of medical things
information security
Industries
Immune system
immune information security
Human Factors
Human behavior
healthcare industry
health care
Device-Connect-Manage
biblio
Faster-Than-Nyquist Signaling for Physical Layer Security on Wireless Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
physical layer security
wireless smart grid
wireless network segment
faster-than-Nyquist signaling
faster-than-Nyquist
coding
artificial noise
signal processing
encoding
wireless networks
information protection
signal processing security
security of data
power engineering computing
smart grid security
security mechanisms
smart power grids
privacy
Metrics
composability
pubcrawl
Resiliency
information security
biblio
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
security
operational assurance
Protocols
Remote Attestation
remote device
resource-constrained edge services
run-time modifications
Scalability
secure edge computing
lightweight dynamic control-flow property-based attestation architecture
security mechanisms
security of data
Software
software assurance
software integrity
software-based attacks
Trusted Component
critical software components
pubcrawl
Human behavior
Resiliency
attack landscape
Cloud Computing
cloud devices
composability
Control-Flow Property-based Attestation
attestation
decentralized solution
defense mechanism
device-integrity
Hardware
industrial IoT applications
intelligent edge computing systems
Internet of Things
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 12:34pm
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 11:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
biblio
Design and Implementation of a Fire Detection andControl System with Enhanced Security and Safety for Automobiles Using Neuro-Fuzzy Logic
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
Resiliency
ignition
integrated microcontroller-based hardware
Metrics
microcontrollers
modern automobiles
multisensor-based fire detection
Neural networks
neuro-fuzzy logic
neuro-fuzzy system
neurocontrollers
pubcrawl
resilience
Global Positioning System based vehicle tracking
road safety
road traffic control
security
security mechanisms
sensor fusion
software system
system submodules
traffic engineering computing
two-step ignition
vehicle architecture
vehicle tracking
vehicle tracking subsystem
engine control
alcoholdetection
anti-theft systems
Arduino Mega 2560
automobiles
biometric ignition
biometric ignition subsystem
C++11
central control unit
Control System
data fusion
efficiency 80 percent
efficiency 95 percent
alcohol detection
enhanced safety measures
enhanced security
Fingerprint recognition
fire detection
fire detection subsystem
Fires
fuzzy control
Fuzzy logic
fuzzy logiccontrol
fuzzy neural nets
Global Positioning System
biblio
A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
trust model
Trust Management.
TCP SYN flooding attacks
security of data
security mechanisms
security
Resiliency
resilience
Receivers
pubcrawl
packet dropping attacks
Anomaly Detection
intrusion detection system
Intrusion Detection
Fuzzy logic
distributed denial of service attacks
distributed denial of service
denial-of-service attack
denial of service
counter-security issues
computer resources
Computer crime
« first
‹ previous
1
2
3
4
next ›
last »