Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
road safety
biblio
A Decentralized Reputation Management System for Securing the Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
reputation-based security approaches
locally-perceived behavioral reputation parameters
malicious vehicles
Metrics
networking model
Peer-to-peer computing
Protocols
pubcrawl
reputation metrics
reputation system
IoV network
Resiliency
road conditions
road safety
Roads
security
VANET environment
VANET Security
vehicular ad hoc networks
faulty vehicles
communication protocols
communication security
Computational modeling
computer network security
Cryptography
cryptography techniques
cyber physical systems
decentralized reputation
decentralized reputation management system
Acceleration
fully decentralized fashion
Human behavior
Human Factors
Industries
interconnected vehicular system
internet
Internet of Vehicles
Internet of Vehicles paradigm
biblio
SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
road safety
vehicular bots
vehicular botnets
vehicular botnet communication
vehicular botnet attacks
VANET Security
SHIELDNET
Reputation-Based Security
Internet botnets
inter-vehicular communications
efficiency 77.0 percent
adaptive detection mechanism
collision avoidance
botnet
Intrusion Detection
learning (artificial intelligence)
Compositionality
Metrics
vehicular ad hoc networks
botnets
invasive software
standards
Protocols
internet
computer network security
Resiliency
pubcrawl
machine learning algorithms
machine learning
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
Recognizing Driver Talking Direction in Running Vehicles with a Smartphone
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
direction-of-arrival estimation
Acoustic Fingerprints
time-of-arrival estimation
talking status identification
speech signal
Source separation
safety enhancement
recognition
phone placements
multipath effects
microphones
in-vehicle environment
fingerprint based sound source localization approaches
driver talking direction recognition
Driver Talking Direction
driver distraction
road safety
channel fingerprint extraction
Acoustic signal processing
driver information systems
signal classification
classification accuracy
fingerprint
speech processing
Human Factors
smartphone
smart phones
composability
pubcrawl
Human behavior
Resiliency
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
biblio
Towards Real-Time-Aware Intrusion Tolerance
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
cyber-physical realtime systems
control engineering computing
intrusion tolerance
cyber physical systems
ISO 26262
safety systems
assisted/autonomous driving
automotive use-cases
cyber-physical real-time systems
authentication
EN IEC 62061
EN ISO 13849
functional safety regulations
real-time-aware intrusion tolerance
real-time-aware intrusion-tolerant architectures
safety requirements
security holes
security
Attack vectors
mobile robots
composability
pubcrawl
Resiliency
cyber-physical systems
real-time systems
Protocols
traffic engineering computing
security of data
Safety
road vehicles
road safety
Automotive engineering
automobiles
biblio
Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
traffic engineering computing
road accidents
road safety
road traffic
Roads
safe transportation
Scalability
security of data
substantial relevance
substantial traffic congestions
telecommunication traffic
Resiliency
traffic information
traffic simulation model
transmitted messages
trust
trusted autonomous vehicle
trustworthiness
VANET
vehicle dynamics
vehicle trust measurement
vehicular ad hoc networks
measuring trust
autonomous vehicle
AV
different OBU components
Driverless Car
extremely dynamic topographical conditions
false information
false trust
Global Positioning System
GPS data
Intelligent Transportation System
Autonomous automobiles
misleading information
On Board Unit
on-board unit components
on-board unit data
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
realistic traffic data
Reliability
resilience
biblio
Security Analysis of Intelligent Transportation Systems Based on Simulation Data
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
threat model
resilience
road safety
road traffic
roadside infrastructure units
security
Security analysis
security model
security of data
pubcrawl
traffic control
traffic engineering computing
Transportation
transportation efficiency
transportation security
vehicle ad hoc networks
Veins
Information systems
Intelligent Data Security
Compositionality
Resiliency
Scalability
Analytical models
Buildings
composability
information security
Intelligent Data and Security
Intelligent Transportation Systems
ITS
ITS system
layered network security model
malicious node threat
Metrics
Networked Control Systems Security
biblio
Towards Privacy in Geographic Message Dissemination for Connected Vehicles
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
legal regulations
Security by Default
vehicle routing
traffic information systems
traffic information
space-filling curves
server infrastructure
Routing
road traffic
privacy-by-design principle
privacy-by-design
privacy-by-default principle
location updates
location based services
road safety
geographic relevance area
geographic message dissemination
consistent hashing
connected vehicles
Traffic Management
user privacy
client-server systems
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
biblio
A Novel Sybil Attack Detection Mechanism for C-ITS
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
resilience
vehicular ad hoc networks
vehicles security
V2V communications
Traffic Safety
traffic model
traffic flow theory
sybil attacks
Sybil attack
SUMO traffic simulator
roads portion
Roads
road vehicles
road traffic
road safety
Resiliency
Accidents
Public key
pubcrawl
Protocols
NS3 network simulator
Metrics
Mathematical model
ITS
Intelligent Transportation Systems
driving experience
detection algorithm
cooperative intelligent transport systems
computer network security
Computational modeling
composability
C-ITS
« first
‹ previous
1
2
3
4
next ›
last »