Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security solutions
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 11:04am
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Towards Protection Mechanisms for Secure and Efficient CAN Operation
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
efficient CAN operation
security solutions
controller area networks
CAN bus
access controller
automotive security
broadband services
CAN data-link layer
CAN Security
Clocks
fault confinement mechanism
iterative research
message priority
numerous proposed solutions
protection mechanisms
real-time message deliverability
secure CAN operation
confinement
Protocols
Automotive engineering
computer network security
telecommunication traffic
authorisation
real-time systems
Resiliency
pubcrawl
composability
automobiles
Industry 4.0
privacy
authentication
Cyber Attacks
cyber-physical systems
error detection
timing
biblio
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
Submitted by grigby1 on Fri, 09/18/2020 - 1:15pm
pre-silicon security assessment
design stage
formal verification methods
hardware designer
hardware overhead
hardware system
hardware vulnerabilities
language based framework
language-based approach
language-based hardware security verification
malicious logic detection
potential security vulnerabilities
design mistakes
promising solution
QIF model
QIF-Verilog
quantified information flow model
quantitative information-flow
security rules
verification process
Verilog type systems
vulnerable logic detection
compiler security
integrated circuit testing
Hardware design languages
Cryptography
security solutions
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Hardware
Integrated circuit modeling
hardware description languages
Scalability
Registers
integrated circuit design
formal verification
Measurement
Compositionality
uncertainty
Vulnerability Analysis
electronic engineering computing
data flow
biblio
Detection of Adversary Nodes in Machine-To-Machine Communication Using Machine Learning Based Trust Model
Submitted by grigby1 on Fri, 06/19/2020 - 10:48am
security
MLBT evaluation model
particle swarm optimisation
Peer-to-peer computing
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
Scalability
Metrics
security solutions
security threats
Supervisory Control and Data Supervisory Acquisition (SCADA)
telecommunication security
Trusted Computing
VBM2M-C network
vehicular ad hoc networks
vehicular based M2M-C network
XGBoost model
Internet of Things (IoTs)
advsersary node detection
binary particle swarm optimization
Computational modeling
Entropy
entropy based feature engineering
extreme gradient boosting model
false trust
feature extraction
Human behavior
Adversary Models
Internet of Vehi-cles(IoVs)
learning (artificial intelligence)
machine learning
Machine Learning Based Trust (MLBT)
machine learning based trust evaluation model
machine-to-machine (M2M)
machine-to-machine communication
machine-to-machine communications
malicious activity detection
biblio
A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
privacy-respecting Deep Packet Inspection
network payloads
organizational policies
passive proxying
Perfect Forward Secrecy
policy based framework
privacy
Privacy Policies
Privacy Requirements
privacy-aware techniques
Network connections
pubcrawl
Scalability
security solutions
semantic technologies
telecommunication traffic
TLS 1.3
unencrypted payloads
user access privileges
decryption
access decision
active proxying
attribute based access control
Attribute-based Access Control (ABAC)
big-data problem
computer network security
critical requirement
Cryptography
data privacy
Access Control
deep packet inspection
DPI analysis
DPI tools
fully encrypted data-transfer
high velocity network traffic
Human behavior
internet
malicious activity
biblio
Comparative Analysis of Lightweight Block Ciphers in IoT-Enabled Smart Environment
Submitted by aekwall on Mon, 01/20/2020 - 10:58am
privacy
ultra-lightweight block ciphers
Software
smart computing environment
signal processing
security solutions
security in resource-constrained environment
Schedules
Scalability
resource-constrained environment
Resiliency
real-life things
rapid technological growth
pubcrawl
32-bit cipher
lightweight cryptography
lightweight cryptographic solutions
Lightweight Ciphers
lightweight block ciphers
IoT-enabled smart environment
Internet of Things
Hardware Implementation
encryption
Cryptography
Comparative Analysis
Ciphers
32-bit ultra-lightweight block cipher security model
biblio
A Security Framework for ICN Traffic Management
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
ICN attacks
Traffic Management
security solutions
security framework
Routing
Resiliency
resilience
pubcrawl
privacy component
privacy
legitimate users
internet
information centric networking
ICN traffic management
ICN communication model
Access Control
ICN architectures
ICN
framework components
data privacy
data objects
data integrity
content popularities
computer network security
Computer crime
computer architecture
composability
Autonomic Security
authorisation
access control component
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience
1
2
next ›
last »