Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Object recognition
biblio
IoT Devices Security Using RF Fingerprinting
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
software defined radio
Radio frequency
Radio Frequency Fingerprinting
RF Fingerprinting
Scalability
scalability problems
SDR
security
security scalability
smart devices
pubcrawl
software radio
telecommunication security
Telecommunication standards
universal SDR-based inexpensive implementation
user-dedicated modes
Wireless communication
wireless RFF
wireless security authentication
feature extraction
authentication problem
Compositionality
computational complexity
computer network security
Cryptographic Protocols
cryptography-based authentication protocols
device identity fingerprint
emitted wireless signals
authentication
Fingerprint recognition
Internet of Things
Internet of Things devices industry
IoT
IoT devices security
mobile phone signal burst extraction
Object recognition
physical layer-based security authentication method
biblio
Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method
Submitted by grigby1 on Wed, 10/02/2019 - 3:02pm
radiofrequency identification
wireless device
telecommunication security
security bit method
security
RFIDs
RFID technology
RFID tags
RFID tag
RFID systems
RFID security development
RFID reader
RFID
Resiliency
resilience
counterfeit
Radio frequency identification (RFID)
radio frequency identification
Radar
pubcrawl
privacy problems
privacy
Object recognition
Human Factors
Human behavior
Electronic Product Code (EPC)
Digital Information
Databases
data privacy
biblio
Digital Blues: An Investigation Into the Use of Bluetooth Protocols
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
Data collection
bluetooth security
time 1.0 week
Object recognition
mobile devices
digital blues
Bluetooth protocols
Bluetooth mobile device communications
Bluetooth Detection
Bluetooth
encryption
mobile radio
security attacks
Mobile handsets
composability
pubcrawl
Human behavior
Resiliency
Protocols
telecommunication security
biblio
Concept for Increasing Security of National Information Technology Infrastructure and Private Clouds
Submitted by grigby1 on Fri, 09/28/2018 - 4:04pm
IP networks
Unicast
Routing
Resiliency
resilience
pubcrawl
Protocols
private clouds
policy-based governance
Object recognition
object identifier
national information technology infrastructure
ISO standards
IPv6-protocol
IPv6-header
Cloud Computing
internet
information technology infrastructure
information security
Human behavior
government data processing
global routing prefix
global information community
e-governments
E-Government
Cybersecurity
computer network security
coding IPv6-addresses
codes of countries
clouds
biblio
A SDN security control forwarding mechanism based on cipher identification
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
network management
user nonrepudiation
software defined networking
Servers
security control forwarding
SDN network security control forwarding mechanism
SDN
Resiliency
resilience
Repudiation
pubcrawl
programmability
packet authenticity
Object recognition
network services
authentication
network architecture
Metrics
human factor
Human behavior
forwarding device
flow table matching
Databases
Cryptography
control capabilities
computer network security
computer network management
composability
Ciphers
cipher identification
biblio
Chaining trusted links by deploying secured physical identities
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
unclonable physical tokens
Trust management
trusted links
trusted link
Trust Chaining by Physical Tokens
smart devices
security of data
security chain
secured physical identities
Secret Unkown Cipher
secret unknown ciphers
Scalability
Resiliency
authentication
Protocols
physical clone-resistant identities
Object recognition
Internet of Things
intermediate node
Identity management
Human behavior
generic node authentication protocols
Cryptography
Cryptographic Protocols
clone-resistant physical identity
Ciphers
biblio
Physical security assessment with convolutional neural network transfer learning
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
security of data
physical security
physical security assessment
physical security system
physical security video data
pubcrawl
Resiliency
Scalability
security
Periodic retraining
Support vector machines
target detection
Training
Training data
transfer learning
video signal processing
visible imager data
artificial intelligence security
object recognition tasks
Object recognition
object detection
Nuisance Alarms
neural nets
Metrics
machine learning
learning (artificial intelligence)
human in the loop ground truth data
Human behavior
feature extraction
deep learning techniques
convolutional neural network transfer learning
convolutional neural network
Artificial Neural Networks
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
A framework for digital forensics analysis based on semantic role labeling
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
Labeling
text analysis
semantic texts annotation
Semantics
semantic role labeling
semantic annotation
Scalability
Resiliency
pubcrawl
Object recognition
natural language processing
Mobile handsets
Crime Analysis
knowledge based systems
knowledge base
Human behavior
frame semantics
FrameFOR
forensic frames
forensic experts
forensic analysis
Digital Forensics
digital forensic analysis
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »