Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacks
biblio
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
Hash Function
Secure hash algorithms
pseudo-random number generator
occupational safety
Algorithms
SHA
attacks
cryptanalysis
information science
hash algorithms
pubcrawl
Hash functions
Resistance
Compositionality
NIST
Cryptography
Generators
Heuristic algorithms
Resiliency
resilience
biblio
An Overview on Detection and Prevention of Application Layer DDoS Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 2:10pm
attacks
Low and Slow attacks
Layer 7
HTTP flooding
HOIC
Application Layer
Slowloris
Ions
DDoS Attack Prevention
codes
Resiliency
pubcrawl
denial-of-service attack
Compositionality
DDoS
composability
Databases
Protocols
web services
Conferences
resilience
Metrics
biblio
A Novel Approach Exploiting Machine Learning to Detect SQLi Attacks
Submitted by grigby1 on Fri, 02/03/2023 - 3:50pm
Databases
false negative
CountVectorizer
SQL injection detection
False Positive
OWASP
SQL injection
Performance analysis
attacks
Data mining
feature extraction
privacy
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
machine learning algorithms
biblio
An Innovative Method in Improving the accuracy in Intrusion detection by comparing Random Forest over Support Vector Machine
Submitted by grigby1 on Thu, 01/05/2023 - 2:19pm
Analytical models
supply vector machines
supervised machine learning
recognition
Innovative Support Vector Machine
Random Forest
attacks
Accuracy
Performance
composability
machine learning algorithms
Radio frequency
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Support vector machines
Forestry
security
biblio
Multiple Security Threats with Its Solution in Internet of Things (IoT)
Submitted by aekwall on Fri, 09/30/2022 - 2:46pm
composability
the System model of IoT
smart technologies
security attacks
Power engineering
IoT security
Firewalls (computing)
attacks
Industries
security
Human behavior
Resiliency
Metrics
pubcrawl
real-time systems
performance evaluation
IoT
Organizations
biblio
Defences Against web Application Attacks and Detecting Phishing Links Using Machine Learning
Submitted by aekwall on Fri, 07/01/2022 - 9:47am
Classification algorithms
Chained Attacks
Web application
PHP and MySQL
long short term memory networks
logistic regression
Apache access Logs
server
application security
support vector machine
Random Forest
Phishing
Support vector machines
attacks
cyber security
Training data
machine learning
Resiliency
Scalability
pubcrawl
machine learning algorithms
Training
deep learning
biblio
Doodling Based CAPTCHA Authentication System
Submitted by grigby1 on Thu, 06/30/2022 - 1:17pm
Technological innovation
video
Turing test
generic system
voice recognition
Limiting
image recognition
web security
attacks
CAPTCHA
captchas
CNN
image
face recognition
Portable computers
composability
Computers
internet
authentication
Human behavior
pubcrawl
machine learning
biblio
Energy Efficient Security Solution for Attacks on Wireless Sensor Networks
Submitted by grigby1 on Tue, 04/19/2022 - 10:39am
pubcrawl
WSN
wireless sensor networks
Wireless communication
Sensor Systems
sensor security
security
Scalability
resilience
attacks
Protocols
Market research
IoT
Forestry
Energy Efficiency
encryption
cyber physical systems
biblio
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks
Submitted by aekwall on Fri, 02/04/2022 - 10:31am
attacks
Repudiation
X.509 PKI
Vehicle-to-grid
Vehicle to Grid
security requirements
ISO standards
ISO 15118 Standard
data integrity
simulation
composability
Human behavior
Resiliency
Metrics
pubcrawl
Protocols
authentication
Computational modeling
biblio
Security architecture for UAV
Submitted by aekwall on Mon, 12/20/2021 - 12:19pm
Neural networks
wireless
Wi-Fi
vulnerabilities
threats
statistical analysis
security
Resiliency
pubcrawl
Ad Hoc Network Security
Metrics
Law
cyber-physical systems
computer architecture
Compositionality
attacks
ad-hoc systems
Ad hoc networks
1
2
3
4
5
6
7
8
next ›
last »