Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacks
biblio
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Submitted by aekwall on Mon, 09/28/2020 - 11:11am
data logs
Mutation testing
actuators
CPS
model checking
cyber-physical system
supervised machine learning
code mutation
code-modification attacks
cross-validation
formal verification
invariants
learnt model
real-world water purification plant
Statistical Model Checking
SVM-based model
system modelling
water treatment systems
CPS Privacy
pubcrawl
Software
attestation
Data models
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Human behavior
Monitoring
program testing
privacy
attacks
Anomaly Detection
cyber physical systems
program diagnostics
sensors
Human Factors
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
radio networks
White spaces
volatile operating environment
volatile environment
telecommunication security
security issues
security
Scalability
RL parameters
RL model
resource management
Resiliency
resilience
reinforcement learning model
Reinforcement learning
attacks
pubcrawl
pattern clustering
operating region
network scalability
learning rate
learning (artificial intelligence)
launch attacks
Heuristic algorithms
distributed cognitive radio networks
discount factor
Cognitive Radio Security
cognitive radio
clustering scheme
clustering
biblio
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
fault tolerant key generation
brute force attacks
Wireless communications
spread spectrum communication
sensor networks
Security parameters
secure spread spectrum communication
Secure Spread Spectrum
mobile ad hoc networks
mobile ad hoc network
level message security
level encryption securities
key generation
group key generation algorithms
Fault tolerant systems
Cryptography
complex Random key generation algorithms
client side encryption
attacks
fault tolerance
Brute Force Attack
AES
policy-based governance
Human Factors
Force
collaboration
pubcrawl
telecommunication security
Wireless communication
Servers
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
stochastic petri nets
Damage Assessment
transmission line protection systems
substation
power transmission protection
power system structure
power system components
Petrinet
nonintelligent attacks
intelligent attack
IEEE39 bus system
electrical network
cyber security risk assessment method
cyber physical performance
attacks
power supply
security of data
Cyber Physical System
smart power grid
power transmission lines
Stochastic processes
substation automation
cyber security
Petri nets
power system security
power engineering computing
probability
Cyber Attacks
smart power grids
Risk
pubcrawl
Resiliency
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment
Submitted by aekwall on Mon, 06/01/2020 - 9:43am
IoT networks
telnet honeypot detection
SSH Honeypots
security
Scalability
resource-constrained interconnected smart devices
Resiliency
pubcrawl
probability
probabilistic estimation
potential dynamic threats
network intrusion
attacks
intrusion-related threats
intrusion mission
intrusion
Internet of things environment
Internet of Things
Human Factors
honey pots
cyber security crimes
computer network security
Computer crime
attacks mitigation
biblio
An Innovative Model (HS) to Enhance the Security in Windows Operating System - A Case Study
Submitted by grigby1 on Fri, 04/17/2020 - 10:27am
NT LAN manager
Windows Registry
Windows Operating System Security
Windows operating system
Windows
SAM security account manager
SAM file protection
Resiliency
resilience
pubcrawl
privacy
password
NTLM
attacks
Microsoft Windows (operating systems)
Metrics
message authentication
login credentials
HS model
force attacks
dictionary attacks
Data Security
Data protection
data integrity
composability
authorisation
biblio
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Submitted by aekwall on Mon, 04/06/2020 - 9:06am
DIP-generation attack
pattern locks
SigAttack
SAT-resilient encryptions
piracy
logic encryption design
key-revealing signature
high-level SAT-based attack
hardware protection technique
Electronics packaging
distinguishing input pattern generation
Scalability
Error analysis
logic design
Logic gates
Complexity theory
attacks
pubcrawl
Human behavior
Resiliency
Hardware
Cryptography
biblio
Analysis of Realistic Attack Scenarios in Vehicle Ad-Hoc Networks
Submitted by grigby1 on Mon, 03/02/2020 - 12:37pm
resilience
vehicular ad hoc networks
vehicle connectivity
vehicle ad-hoc networks
VANET
V2V
unprecedented security concerns
telecommunication security
technological development
sybil nodes
sybil attacks
Sybil attack
security countermeasures
security
Resiliency
advanced attacks
replay attack
realistic attack scenarios
pubcrawl
OMNeT++ simulation environment
OMNET++
Metrics
inter-vehicular communication
Driver assistance systems
disruptive innovations
composability
common attacks
Autonomous Driving
automotive transportation
attacks
biblio
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper)
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
Hardware Security
Ubiquitous Computing Security
ubiquitous hardware security
Thermal stability
security-sensitive applications
random number generators
pufs
power penalty
low-end devices
Low power
HW security
energy-efficient primitives
ubiquitous computing
error correction codes
security
Human Factors
Random access memory
Entropy
attacks
design requirements
Metrics
pubcrawl
Resiliency
power aware computing
attack surface
Hardware
Cryptography
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »