Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computing technologies
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
power systems infrastructures
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
Critical Infrastructure Protection
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
power system faults
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
security of data
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Security on RFID technology
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
building access
computing technologies
counterfeiting
Noise measurement
pubcrawl170112
radio frequency identification
radiofrequency identification
RFID
RFID data security
RFID systems
RFID technology
security of data
Security on RFID
supply chains
telecommunication computing
tracking livestock
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 1:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity