Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Time factors
biblio
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
command injection attacks
Time factors
substation automation system
substation automation
stealthy injection attacks
security technologies
SaS
Queueing analysis
QoS requirements
Message service
IEC61850s GOOSE messaging service
generic object oriented substation events messaging service
communications channels
security of data
quality of service
power system security
power engineering computing
IEC standards
Substations
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG 2015) dataset
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
privacy
microcontrollers
Microsoft Malware Classification Challenge BIG2015
microsoft malware Classification challenge dataset
neural network
pattern classification
Pattern recognition
pattern recognition algorithms
principle component analysis
Metrics
pubcrawl
resilience
Resiliency
security
sensors
superior architecture
Time factors
gray scale images
autoencoder
classification process
classifier
Cybersecurity
deep learning
deep learning architecture
Devices
Global Positioning System
Acoustics
Human behavior
invasive software
Latches
learning (artificial intelligence)
malicious programs
malware classification
malware programs
biblio
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
production engineering computing
Time factors
supply chain security
supply chain management
Servers
security of data
security issues
Secure-EPCIS
SCM
Scalability
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
Access Control
Product codes
Permission
Mobile communication
IoT
Internet of Things
Human behavior
EPCIS
EPCglobal standards
EPCglobal Network
electronic products
Electronic Product Code Information System
Data Security
access-control
biblio
Autonomic Security for Zero Trust Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
authentication
Cloud Computing
Computer crime
Human behavior
Human Factors
Logic gates
Metrics
Organizations
pubcrawl
Resiliency
Scalability
Time factors
Ubiquitous Computing Security
biblio
Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
QoS
VM-based intrusion tolerant systems
Virtualization
virtual machines
virtual machine
Time factors
security of data
security
Resiliency
queueing theory
quality of service
composability
pubcrawl
MTTSF
mean time to security failure
Markov processes
Markov model
intrusion tolerance
Electronic mail
Computers
Computational modeling
biblio
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
proactive jamming attacks
Wireless communication
time-critical data delivery
time-critical applications
Time factors
telecommunication security
telecommunication channels
sensors
security-aware channel assignment
security
Resiliency
pubcrawl
probabilistic spectrum assignment algorithm
Channel allocation
jamming attacks
Jamming
IoT-based CRN
IoT-based cognitive radio networks
Internet of Things
fading conditions
delays
cognitive radio transmission
Cognitive Radio Security
cognitive radio
channel assignment problem
biblio
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
fuzzy set theory
Trusted Computing
trust evaluation
Time factors
security
pubcrawl170107
Measurement
infrastructure as a service
hierarchical trust model
heterogeneous cloud infrastructure
AHP
fuzzy based mechanism
Fuzzy
estimation
data privacy
cloud service providers
cloud computing services
Cloud Computing
analytic hierarchy process
AHP model
biblio
"Verification for Security-Relevant Properties and Hyperproperties"
Submitted by grigby1 on Thu, 02/23/2017 - 12:37pm
model checking
wireless sensor networks
verification
Time factors
security-relevant property verification
security-relevant properties
security policy
Safety
pubcrawl
program verification
privacy analysis
Access Control
liveness
hyperproperty verification
hyperproperty
fairness
embedded systems
pubcrawl170105
data privacy preservation
data privacy
Computational modeling
biblio
Morphing communications of Cyber-Physical Systems towards moving-target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:18am
morphing communications
traffic analysis attacks
Time factors
thwarting traffic analysis attacks
telecommunication traffic
Silicon
security
reliable communication services
real-time systems
networking infrastructures
network sessions
moving-target defense
Algorithm design and analysis
long-range communication services
internet
inter-packet delays
Information systems
eavesdrop network traffic
delays
cyber-physical systems
CPSMorph traffic morphing algorithm
CPS traffic
computer network reliability
« first
‹ previous
1
2
3
4
5
6
next ›
last »