Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Europe
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
Threat awareness for critical infrastructures resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
Context
critical infrastructure resilience
critical infrastructures
Data protection
Europe
European utility company
integrated circuits
Market research
pubcrawl
public utilities
resilience
utility network protection
Resilient Security Architectures
security
Security Awareness
security of data
security risk
Smart Grids
social engineering
Software Architecture
threat awareness
threat awareness architecture
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
IP networks
Semantics
Routing
Resilient Networks
Resiliency
Reliability
pubcrawl
Power Grid
overlay networks
North America
network infrastructure
Monitoring
malicious attacks
composability
IP infrastructure
intrusion-tolerant overlay implementation
intrusion-tolerant network service
intrusion tolerance
internet
high-value applications
global cloud
Europe
East Asia
critical infrastructure
computer network security
biblio
Correlating cyber incident information to establish situational awareness in Critical Infrastructures
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
feature extraction
vulnerability detection
text analysis
security information correlation
security
Resiliency
pubcrawl
Metrics
Mathematical model
Joining processes
information correlation
Human Factors
Human behavior
Compositionality
Europe
Data Exfiltration
cyber situational awareness
cyber incidents handling
cyber incident information correlation
cyber attack
critical infrastructures
Critical Infrastructure Protection
critical infrastructure
Correlation
computer network security
biblio
Password authentication using Keystroke Biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
password
user verification mechanism
user natural typing pattern
User behavior
typing pattern matching
Text recognition
Support vector machines
security
robust security technique
pubcrawl170115
pattern matching
password security
Password authentication
artificial neural network
neural nets
Monitoring
keystroke biometrics
Hardware
Europe
error rates
Error analysis
Classification algorithms
biometrics (access control)
authorisation
authentication
Artificial Neural Networks
biblio
Detecting untestable hardware Trojan with non-intrusive concurrent on line testing
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
manufacturing testing
untestable hardware trojan
Trojan horses
security
Radiation detectors
pubcrawl170112
nonintrusive concurrent on line testing
Monitoring
microprocessor chips
built-in self-test
manufacturing stage
manufacturing cycle
integrated circuit testing
HT
Hardware
Europe
circuit geometrical characteristics
chip supply chain
biblio
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
Trojan horses
trees (mathematics)
risk analysis
pubcrawl170109
probability estimation
probability
online financial service
Online banking
IRT
Computer crime
incident response tree
fraud prevention modelling
fraud
financial data processing
Europe
estimation theory
cyber criminal
conditional fraud value
biblio
"Application specific processor design for DCT based applications"
Submitted by grigby1 on Tue, 02/14/2017 - 1:10pm
FPGA
Watermarking
Transform coding
pubcrawl170102
parallel architectures
parallel architecture
one dimensional DCT
MicroBlaze softcore processer
JPEG compression
image watermarking
image encryption
IDCT hardware
Hardware
Application Specific Processor
field programmable gate arrays
field programmable gate array
Europe
discrete cosine transforms
discrete cosine transform
DCT based image watermarking
DCT based applications
Channel estimation
ASP
Application specific processors
application specific processor design
biblio
"Performance of coded Joint transmit scheme aided MIMO-IDMA system for secured medical image transmission"
Submitted by grigby1 on Tue, 02/14/2017 - 1:07pm
multistream interference
MIMO
MIMO communication
mobile station
multi Stream interference (MSI) SUI channel model
multi-user detection (MUD)
multiple access interference (MAI)
multiple input multiple output (MIMO)
multiple-input multiple-output aided coded interleave division multiple access system
medical image transmission
nonlinear minimum mean square error detection algorithm
normal cell
pubcrawl170102
Stanford University Interim channel models
Streaming media
transmitting antennas
unwanted multiple users image information
Yttrium
Double space-time transmit diversity (DSTTD)
antennas
Arnold's Cat Map encryption algorithm
Biomedical imaging
carcinogenic cell
code division multiple access
coded joint transmit scheme aided MIMO-IDMA system
discrete wavelet transform
discrete wavelet transforms
antenna arrays
DWT
Europe
Interference
interleaved codes
least mean squares methods
LTE channel model
medical image processing
biblio
A survey of Black hole attack detection in Manet
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
Mobile communication
telecommunication security
server
security
RREQ
RREP
Routing protocols
route discovery
received RREQ
radiowave propagation
peer-to-peer network
Peer-to-peer computing
network servers
mobile conferencing
academic purpose
mobile ad-hoc network
mobile ad hoc networks
military communication
MANET
Europe
emergency communication
decentralised network
client-server systems
client
black hole attack detection
Black hole attack
AODV protocol
Ad-HOC
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »