Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
external attacks
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
Submitted by aekwall on Mon, 06/08/2020 - 11:25am
Infrastructure security
star topology
simultaneous game
Servers
security of data
security
Scalability
resource allocation
pubcrawl
Predictive Metrics
optical switches
Numerical models
Nash Equilibrium
interdependency levels
Interdependencies
Integrated optics
Attack Strategies
infrastructure resilience
infrastructure design
Human Factors
Games
game-theoretic defense strategy
game theory
game theoretic security
external attacks
defense effort
cyber-physical infrastructures
Cost accounting
constituent systems
bus structure
basic topological structures
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
Conundrum-Pass: A New Graphical Password Approach
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
graphical password system
pattern locks
unlocking time
trivial password methodologies
textual passwords
smudge attacks
shoulder surfing
security element
pattern lock
Password Submission
Password Registration
multiple chunks
mobile computing environment
graphical passwords
Scalability
graphical password schemes
Graphical Password
external attacks
conundrum-pass
password guessing
Computer graphics
dictionary attacks
authentication
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations