Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security mechanism
biblio
Performance Analysis of Adhoc On-demand Distance Vector Protocol under the influence of Black-Hole, Gray-Hole and Worm-Hole Attacks in Mobile Adhoc Network
Submitted by aekwall on Mon, 01/10/2022 - 12:53pm
network layer attacks
Worm-hole
simulation
security mechanism
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
Performance analysis
AODV
NETSIM
MANET
Human behavior
gray-hole attack
energy consumption
Earthquakes
control systems
black-hole attack
Attack vectors
biblio
Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping
Submitted by grigby1 on Thu, 03/18/2021 - 2:35pm
image segmentation
Web sites
Web Bots
web applications
user-friendliness
text-based CAPTCHA challenge
text analysis
segmentation technique
security of data
security mechanism
pubcrawl
optical character recognition
Multilingual CAPTCHA
internet
CAPTCHA string
Human Interaction Proof
human computer interaction
Human behavior
honeypot technique
honeypot
Hip
hidden text-boxes
deformations
Data protection
composability
captchas
CAPTCHA Usability
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems
Submitted by grigby1 on Tue, 12/15/2020 - 1:41pm
robots
policy-based governance
POMDP
pubcrawl
resilience
Resiliency
resilient control
resilient mechanism
robot operating systems
Physical layer
ROS agent
secure mechanism
security
security mechanism
security of data
security performance
Service robots
time-delay controller
delays
control systems
cross-layer secure approach
Cryptography
cyber-physical nature
cyber-physical systems
decision theory
delay systems
delay-sensitive networked robot operating systems
control engineering computing
Human behavior
Human Factors
industrial robots
Markov processes
networked communication
operating systems (computers)
Partially Observed Markov Decision Process
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
ring analysis engine
trust boundaries
syntactic analysis
structural index
service provider
Semantics
Semantic Mapping
semantic analysis
security requirements
Security Policies Analysis
security of data
security mechanism
security management
security levels
security
Cloud Computing
Reliability
pubcrawl
Protocols
policy-based governance
policy management framework
Policy Management
multilevel security management
mapping process
indexing
Indexes
index-based engine
Engines
collaboration
cloud customers
biblio
A Survey of Research on CAPTCHA Designing and Breaking Techniques
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
CAPTCHA
text-based
Speech recognition
image-based
image segmentation
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAPTCHA designing techniques
CAPTCHA categories
CAPTCHA breaking techniques
audio/video based
attack methods
security of data
captchas
usability
security mechanism
Google
computer science
composability
Human behavior
pubcrawl
security
biblio
Gestures Based CAPTCHAs the Use of Sensor Readings to Solve CAPTCHA Challenge on Smartphones
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
security mechanism
Usability.
sensor readings
network resources
gyroscopes
gyroscope data
gestures
gesture CAPTCHA challenge
CAPTCHA
Accelerometers
accelerometer readings
captchas
malware
usability
gesture recognition
security of data
Smartphones
mobile devices
smart phones
human computer interaction
Mobile handsets
invasive software
mobile computing
composability
performance evaluation
Human behavior
pubcrawl
Servers
security
biblio
Middleware Based Node Authentication Framework for IoT Networks
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
node authentication framework
wireless sensor networks
security of data
security mechanism
security
Resiliency
resilience
pubcrawl
policy-based governance
authentication
Network
middleware security
middleware
IoT networks
Internet of Things
internet
Conferences
composability
biblio
Secure Route Selection Mechanism in the Presence of Black Hole Attack with AOMDV Routing Algorithm
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Blackhole attack
trusted network
terminal node
single attack
sensitive field
secure route selection mechanism
police rescue operation
origin node
collaborative attack
Black hole attack
AOMDV routing algorithm
AOMDV
adversarial network setting
security mechanism
IP networks
mobile ad hoc networks
MANET
collaboration
mobile radio
Reliability
Routing
Routing protocols
pubcrawl
Resiliency
security
telecommunication security
Scalability
1
2
next ›
last »