Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious attackers
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
A Comprehensive Security System for Digital Microfluidic Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 1:36pm
private key cryptography
intellectual property security
invasive software
IP piracy
Lab-on-a-Chip
malicious attackers
Microfluidics
Pins
policy-based governance
intellectual property piracy
pubcrawl
resilience
Resiliency
secret keys
security
trojan
Trojan attacks
Trojan horses
comprehensive security system
authentication mechanism
bioassay completion time
biochips market
biology computing
bioMEMS
Cameras
CCD cameras
composability
authentication
Computer crime
defense mechanisms
Digital Microfluidic Biochips
Digital Microfluidics
DMFBs
Electrodes
Foundries
industrial property
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Modeling of countermeasure against self-evolving botnets
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Markov chains
zombie computers
Viruses (medical)
Software
simulation experiments
self-evolving botnets
Resiliency
Radiation detectors
pubcrawl
Metrics
Markov processes
botnets
malicious attackers
machine learning
learning (artificial intelligence)
invasive software
digital simulation
computing resources
Computers
Computational modeling
Compositionality
biblio
Defensive maneuver cyber platform modeling with Stochastic Petri Nets
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
control systems
Cyberspace
deceptive defense strategies
defensive maneuver cyber platform modeling
information systems security
malicious attackers
military computing
moving target defense strategies
Petri nets
security
security of data
standards
stochastic petri nets
Stochastic processes
biblio
Development of a keyboardless social networking website for visually impaired: SocialWeb
Submitted by BrandonB on Mon, 05/04/2015 - 11:33am
message authentication
Web Speech API
visually impaired people
user friendliness
STT conversion
speech to text conversion technologies
Speech recognition
Speech
SocialWeb
social networking (online)
Social network services
screen readers
screen reader
Acoustic Fingerprinting
Media
malicious attackers
keyboardless social networking Website
human computer interaction
handicapped aids
Fingerprint recognition
Computers
computer proficiency
Communities
Audio fingerprinting
Assitive technologies
assistive technologies