Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attacks
biblio
Study of Security in MANETs and Evaluation of Network Performance Using ETX Metric
Submitted by grigby1 on Mon, 04/30/2018 - 2:08pm
attacks
ETX metric
MANET
Metrics
OLSR
pubcrawl
security
Security Metrics
Smart Environments
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
biblio
Security and trust for surveillance cameras
Submitted by K_Hooper on Wed, 02/28/2018 - 10:32am
abstract vulnerabilities
attacks
Cameras
commercial IP camera
Compositionality
Feeds
IP networks
pubcrawl
security
security of data
standards
surveillance
surveillance cameras
telecommunication security
trust relationships
video surveillance
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
secondary causes
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
program debugging
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF
cryptography related classes
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
BF taxonomy
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
biblio
Gamification of internet security by next generation CAPTCHAs
Submitted by grigby1 on Wed, 12/20/2017 - 12:03pm
Human behavior
Turing tests
pubcrawl
Pattern recognition
Next generation networking
machine learning algorithms
Internet security
Informatics
Human Factors
human beings
attacks
Gamification
Games
computer security
composability
captchas
CAPTCHA
bots
Birds
biblio
Security and privacy on internet of things
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
IoT protocol
wireless sensor networks
telecommunication security
sensors
security of data
security
Resiliency
pubcrawl
Protocols
privacy
Metrics
IoT security
attacks
IoT privacy
IoT devices
Internet of Things (IoT)
Internet of Things
internet
Human Factors
Human behavior
data privacy
computer architecture
composability
biblio
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
Submitted by grigby1 on Mon, 11/20/2017 - 11:04am
Metrics
vulnerabilities
video surveillance systems
video surveillance
threats
survey
shodan
security
Resiliency
pubcrawl
novel covert channels
novel attacks
Mitigations
attacks
IPcam
IoT
Internet of Things
insecurity
insecam
Human Factors
Human behavior
embedded systems
embedded devices
defenses
covert channels
CCTV
biblio
A Surfeit of SSH Cipher Suites
Submitted by grigby1 on Fri, 09/15/2017 - 10:01am
Applied cryptography
attacks
Lightweight Ciphers
network security
openssh
Protocol Security
pubcrawl
Resiliency
SSH
biblio
Development of the Hierarchal Trust Management System for Mobile Cluster-based Wireless Sensor Network
Submitted by grigby1 on Tue, 09/05/2017 - 12:49pm
Anomaly Detection
attacks
authenticity
clustering
Human behavior
Intrusion Detection
pubcrawl
Resiliency
Scalability
sensor security
trust
wireless sensor networks
biblio
A Surfeit of SSH Cipher Suites
Submitted by grigby1 on Tue, 08/22/2017 - 11:07am
Applied cryptography
attacks
composability
Metrics
network coding
network security
openssh
Protocol Security
pubcrawl
Resiliency
SSH
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »