Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
spoofing attack
biblio
Toward attack-resilient state estimation and control of autonomous cyber-physical systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:12pm
Kalman filters
watermarking approach
Watermarking
unmanned ground vehicle
UGV
state estimation
spoofing attack
sensor attacks
security of data
Robot sensing systems
Resiliency
resilience
replay attacks
pubcrawl
mobile robots
attack resiliency
kalman filtering technique
Kalman filter
defense techniques
cyber-physical systems
cyber physical systems
CubeSat
cube satellite
CPS Security
CPS resilience
CPS defense techniques
conjunction achieves
autonomous cyber-physical systems
attack-resilient state estimation
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
A Spoofing Attack against a Cancelable Biometric Authentication Scheme
Submitted by BrandonB on Tue, 05/05/2015 - 7:48am
homomorphic encryption algorithms
Vectors
unexpected vector
spoofing attack
Servers
replay attack
registered biometric information
Public key
privileged entity
network services
list attack
IrisCode
ID-password-based authentication
analogue biometric information
feature vector
encryption
decryption key
Cryptography
competitive code
cancelable biometric authentication scheme
biometrics (access control)
biometric information
binary coding
authorisation
authentication