Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
replay attacks
biblio
Implementation of a Methodology for Detection and Prevention of Security Attacks in Vehicular Adhoc Networks
Submitted by grigby1 on Wed, 09/08/2021 - 9:35am
Reliability
vehicular ad hoc networks
VANETs
Sybille Attack
SUMO
security attacks
security
Roads
Resiliency
resilience
replay attacks
composability
pubcrawl
Prediction algorithms
NS3
network architecture
Metrics
Human behavior
DSR protocol
denial-of-service attack
DDoS Attack Prevention
biblio
Avoidance of Replay attack in CAN protocol using Authenticated Encryption
Submitted by grigby1 on Tue, 06/01/2021 - 2:51pm
Protocols
vulnerabilities
Tiny Encryption Algorithm (TEA)
timestamp
standards
spoofing attacks
sensors
Secure Hash Algorithm (SHA)
Resiliency
resilience
replay attacks
pubcrawl
advanced encryption standard (AES)
privacy
Message Authentication Algorithm (MAC)
message authentication
encryption
Cryptography
Counter
confinement
composability
CAN protocol
authentication
authenticated encryption
biblio
Toward attack-resilient state estimation and control of autonomous cyber-physical systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:12pm
Kalman filters
watermarking approach
Watermarking
unmanned ground vehicle
UGV
state estimation
spoofing attack
sensor attacks
security of data
Robot sensing systems
Resiliency
resilience
replay attacks
pubcrawl
mobile robots
attack resiliency
kalman filtering technique
Kalman filter
defense techniques
cyber-physical systems
cyber physical systems
CubeSat
cube satellite
CPS Security
CPS resilience
CPS defense techniques
conjunction achieves
autonomous cyber-physical systems
attack-resilient state estimation
biblio
An Overview of Security in CoAP: Attack and Analysis
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
network servers
Constrained Application Protocol (CoAP)
Copper
cross-protocol attacks
datagram transport layer security
Datagram Transport Layer Security (DTLS)
denial of service
Denial of Service (DoS) attacks
DoS
DTLS
man-in-the-middle attack
CoAP security attack
peak security issues
proxy
Relay Attacks
replay attacks
request for comments 7252
RFC 7252
smart ecosystems
UDP
User Datagram Protocol (UDP)
Web transfer protocols
secure protocol
Internet of Things
security
Servers
pubcrawl
Human behavior
Metrics
resilience
IoT devices
telecommunication security
Protocols
computer architecture
composability
Browsers
Compositionality
Browser Security
authentication mechanism
Constrained Application Protocol
Internet of Things (IoT)
application layer protocol
channel security
client-server architecture
biblio
Replay Attack Detection Using Magnitude and Phase Information with Attention-based Adaptive Filters
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
attention-based adaptive filters
adaptive filtering
voice activity detection
replay spoofed speech
replay attack detection
phase channel
original phase information
multichannel feature extraction method
magnitude information
magnitude channel complementary features
high discriminative information
frequency-domain analysis
frequency bands
conventional feature extraction techniques
automatic speech verification systems
Scalability
ASVspoof 2017
adaptive filters
Mel frequency cepstral coefficient
phase information
spoofing attacks
fast Fourier transforms
replay attacks
Databases
Metrics
pubcrawl
Resiliency
feature extraction
Task Analysis
telecommunication security
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
mutual authentication
Servers
Scalability
resource-rich server authentication
Resistance
Resiliency
resilience
replay attacks
Registers
PUF-based authentication method
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy-based governance
physical unclonable function-based authentication protocol
physical unclonable function (PUF)
active deception protocol
Multiplexing
ML attack
machine learning attacks
learning (artificial intelligence)
Generators
false trust
false PUF multiplexing
Cryptographic Protocols
challenge response pairs
Buildings
binary channel
authentication protocol
authentication
authentic CRP
attack resistant deception technique
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
Event-triggered Control for Networked Control Systems Under Replay Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 4:41pm
Delay effects
Networked Control Systems Security
Stability analysis
robust event-triggered controller design method
replay attacks
nonlinear control systems
NCSs
general random replay attack model
event-triggering condition
event-triggered control
control signal
consecutive replay attacks
closed-loop system stability
control system synthesis
security
power system stability
Numerical models
Metrics
stability
closed loop systems
control systems
sensors
composability
networked control systems
Resiliency
resilience
pubcrawl
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
request message
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
message serial number
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
EAP-TLS authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
802.1X / EAP authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
1
2
next ›
last »