Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacks
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography
biblio
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication
Submitted by aekwall on Mon, 02/10/2020 - 11:04am
Metrics
vehicle sensors
tracing system
threats
telecommunication channels
Start System
security
Scalability
Resiliency
pubcrawl
PKES system
PKES Forcefield movement-tracing
pattern locks
passive keyless entry and start system
multifactor authentication
amplified relay attack
keys (locking)
Key Bearing algorithm
Human Factors
Human behavior
entry access system
coordinate tracing
CAR security
Bluetooth communication channel
Bluetooth
automotive electronics
automobile security
authentication
attacks
biblio
Adversarial Authorship Attribution in Open-Source Projects
Submitted by grigby1 on Mon, 01/27/2020 - 11:29am
adversarial
attacks
authorship attribution
Human behavior
Human Factors
imitation
Metrics
obfuscation
open-source software
pubcrawl
stylometry
file
Cyber Attack-Defense Modeling, Risk and Contingency Analysis for the Power Grid using Game Theory
Submitted by Mani Govin on Thu, 01/16/2020 - 2:28pm. Contributors:
Manimaran Govindarasu
Radhakisan Baheti
Sourabh Bhattacharya
Kush Khanna
Burhan Hyder
Hamid Emadi
game theory
CPS Security
threats
attacks
defenses
risk assessment
and CPS Investment
Posters
1739969
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
DDoS Prevention Using D-PID
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
Heuristic algorithms
telecommunication network routing
Static Path Identifiers
Servers
Routing
Resiliency
resilience
pubcrawl
PIDs
Metrics
internet
inter-domain routing component
Inter-domain routing
inter-domain path connector
Human behavior
attacks
Floods
Dynamic Path Identifiers
distributed denial of service attack
DDoS prevention
DDoS Attacks
DDoS Attack Prevention
DDoS
D-PIDs
D-PID usage
control systems
Conferences
computer network security
Computer crime
composability
biblio
A Brief Look at the Security of DeviceNet Communication in Industrial Control Systems
Submitted by aekwall on Mon, 12/16/2019 - 1:29pm
security
Internet of Things
Industrial Control Systems
cyber-physical systems
pubcrawl
attacks
resilience
DeviceNet
controller area network security
biblio
Trust Based Certificate Revocation and Attacks in MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
Metrics
vector-based trust mechanism
telecommunication security
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile computing
mobile ad-hoc network security
mobile ad hoc networks
Ad hoc networks
MANET security
MANET
enhanced certificate revocation scheme
data packets
Conferences
Compositionality
clustering
Certificate Revocation
blackhole attacker
attacks
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 9:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
biblio
Software-Defined Networking for Improving Security in Smart Grid Systems
Submitted by aekwall on Mon, 03/18/2019 - 8:55am
Resiliency
wide-area security management
traditional smart grid systems
traditional smart grid architecture
software-defined networking
software defined networking
smart power grids
Smart Grids
smart grid security
Smart Grid
smart decision making
security of data
SDN-based smart grid systems
SDN based solutions
SDN
Scalability
attacks
pubcrawl
Protocols
power system security
power engineering computing
Metrics
mentioned security threats
main cyber-security objectives
IP networks
distributed security
Decision Making
cyber security
control systems
computer architecture
Big Data
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »