Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
replay attack
biblio
Implementation of Replay Attack in Controller Area Network Bus Using Universal Verification Methodology
Submitted by grigby1 on Thu, 02/24/2022 - 11:30am
Controller area network (CAN)
Verification testbench
Universal Verification Methodology (UVM)
Universal Verification Components (UVC)
replay attack
pubcrawl
Protocols
protocol verification
privacy
policy-based collaboration
integrated circuits
fault diagnosis
delays
controller area network security
control systems
Compositionality
composability
collaboration
Circuit faults
CAN Frames
Artificial Intelligence
Application Specific Integrated Circuits (ASIC)
Internet of Things
Resiliency
cyber-physical systems
biblio
Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems
Submitted by aekwall on Mon, 01/10/2022 - 11:48am
Asymmetric Encryption
Compositionality
Resiliency
the 3rd Generation Partnership Project (3 GPP)
Subscription Permanent Identifier (SUPI)
Subscription Concealed Identifier (SUCI)
replay attack
home automation
guess attack
Elliptic Curve Integrated Encryption Scheme (ECIES)
security
Human behavior
Metrics
pubcrawl
Public key
Wireless communication
encryption
5G mobile communication
privacy
biblio
Machine Learning Enabled Secure Collection of Phasor Data in Smart Power Grid Networks
Submitted by grigby1 on Tue, 10/12/2021 - 1:45pm
Predictive sampling
wireless sensor networks
Wireless communication
Smart Grids
sensors
Resiliency
replay attack
Recurrent Neural Networks (RNN)
pubcrawl
Communication system security
power grid vulnerability analysis
power grid vulnerability
Phasor networks
Phasor measurement units
Metrics
machine learning
False Data Injection
composability
biblio
Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
internet
streaming bots attack
Streaming bots
Servers
security attacks
security attack
screenlogger
replay attack
pubcrawl
phishing attack
password-guessing attack
password
one time password
message authentication
keylogger
authentication
Intelligent captcha technique
Intelligent Authentication Scheme
Human behavior
hardware-independent Authentication Scheme
Hardware
denial of service
Cryptography
Cryptographic Protocols
computer network security
Computer crime
composability
Cloud Computing
captchas
CAPTCHA
biblio
Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
light emitting diodes
synchronization message
synchronization deviation
on-board communications
counter value
counter synchronization method
CAN
controller area networks
Security Evaluation
automobile security
replay attack
DoS attack
Automotive engineering
controller area network security
message authentication
Synchronization
synchronisation
pubcrawl
Resiliency
cyber-physical systems
Receivers
Internet of Things
Conferences
computer network security
biblio
Cookie Based Protocol to Defend Malicious Browser Extensions
Submitted by grigby1 on Fri, 04/17/2020 - 9:45am
HTTP cookie
browser extension
Chrome store
cookie management
customizing web browsers
defend malicious browser extensions
dynamic cookies
dynamic encrypted cookies
features increase
authentication protocol
offline extension installations
privileges browser extensions
replay attack
session hijacking
software module
static cookies
user interface modifications
Web Browser Security
Protocols
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
authentication
internet
Cryptography
composability
online front-ends
Metrics
Browsers
Compositionality
password
user interfaces
biblio
Analysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks
Submitted by grigby1 on Mon, 03/02/2020 - 12:37pm
resilience
vehicular ad hoc networks
vehicle connectivity
vehicle ad-hoc networks
VANET
V2V
unprecedented security concerns
telecommunication security
technological development
sybil nodes
sybil attacks
Sybil attack
security countermeasures
security
Resiliency
advanced attacks
replay attack
realistic attack scenarios
pubcrawl
OMNeT++ simulation environment
OMNET++
Metrics
inter-vehicular communication
Driver assistance systems
disruptive innovations
composability
common attacks
Autonomous Driving
automotive transportation
attacks
biblio
An Effective Swarm Optimization Based Intrusion Detection Classifier System for Cloud Computing
Submitted by aekwall on Mon, 01/27/2020 - 9:25am
Flooding Attack
Task Analysis
swarm optimization algorithms
Swarm Intelligence Optimization
Swarm intelligence algorithm
Swarm Intelligence
replay attack
pubcrawl
particle swarm optimization
particle swarm optimisation
optimization
numerical problems
Intrusion detection classifier
foraging characteristics
ABC algorithm
effective swarm optimization based intrusion detection classifier system
effective classifier
DoS attack
computer network security
Compositionality
composability
Communication Systems
cloud computing environment
Cloud Computing
Classification algorithms
Artificial Intelligence
artificial bee colony algorithm
Artificial Bee Colony
biblio
Mitigating Physical Layer Attack in Cognitive Radio - A New Approach
Submitted by grigby1 on Thu, 12/05/2019 - 9:56am
pubcrawl
Zadoff-Chu sequence
wireless channels
telecommunication security
spectrum sensing
sensors
Resiliency
resilience
replay attack
radio spectrum management
radio frequency spectrum
PUEA
authentication
primary user emulation attack
physical layer attack mitigation
Physical layer
OFDM
emulation
distance calculation
Correlation
Communication channels
Cognitive Radio Security
cognitive radio
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
1
2
next ›
last »