Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security monitoring
biblio
Data traceability scheme of industrial control system based on digital watermark
Submitted by grigby1 on Thu, 08/24/2023 - 2:59pm
Production systems
digital watermarking
Data traceability
fourth industrial revolution
Soft sensors
Production management
Data Security
security monitoring
industrial internet
pubcrawl
Industrial Control Systems
Watermarking
industrial control system
process control
internet
Scalability
Resiliency
resilience
biblio
A Hardware-Assisted Security Monitoring Method for Jump Instruction and Jump Address in Embedded Systems
Submitted by grigby1 on Thu, 07/13/2023 - 3:30pm
composability
jump instruction
jump address
Resiliency
security monitoring
Embedded System
Loading
integrity
Data mining
security
Computers
embedded systems
Hardware
resilience
Metrics
pubcrawl
Monitoring
biblio
Research on the feasibility technology of Internet of things terminal security monitoring
Submitted by grigby1 on Fri, 07/29/2022 - 9:02am
power grids
power grid vulnerability analysis
Technical requirements
security monitoring model
security analysis algorithmsecurity monitoring
security analysis algorithm
security monitoring
security protection
Systems architecture
Situation Awareness
Cloud Computing
Metrics
real-time systems
Protocols
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Deep Security Scanner for Industrial Control Systems
Submitted by grigby1 on Mon, 04/25/2022 - 3:23pm
Protocols
white-listing
security monitoring
Scalability
SCADA systems
SCADA
Safety
Resiliency
resilience
pubcrawl
Pervasive Computing Security
power systems
passive monitoring
Oils
Modbus-TCP communication protocol
integrated circuits
industrial control
Deep Packet Inspection (DPI)
deep packet inspection
biblio
Security Monitoring System Using Magnetically-Activated RFID Tags
Submitted by grigby1 on Thu, 09/16/2021 - 2:10pm
radio frequency identification
Switches
sensors
security monitoring
RFIDs
RFID
Resiliency
resilience
reed switch
Radio frequency identification (RFID)
Antenna measurements
pubcrawl
proximity sensor
Passive RFID tags
Monitoring
magnetic sensors
IoT
Human behavior
Entry detection
antennas
biblio
Detecting Blockchain Security Threats
Submitted by grigby1 on Tue, 04/27/2021 - 2:19pm
insider threat
Organizations
security
Monitoring
blockchain
pubcrawl
resilience
Resiliency
Scalability
information security
Measurement
distributed ledger
permissioned blockchain
Fabrics
security monitoring
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Smart e-Health Security and Safety Monitoring with Machine Learning Services
Submitted by grigby1 on Tue, 02/23/2021 - 2:25pm
resilience
Metrics
Monitoring
network accountability
patient monitoring
patient treatment
patient treatment medication safety issues
Privacy Requirements
Protocols
pubcrawl
regional regulations
medical treatment process
Resiliency
Safety
safety monitoring
security monitoring
service providers
smart e-health security
transaction flows
trust health information environment
Trusted Computing
HIPAA
composability
Cryptography
data privacy
Distributed databases
e-health blockchains
EU-GDPR
health and safety
health care
Healthcare
Accountability Solution
HITECH
Intelligent Analytics
intelligent monitoring
Keywords- e-Health Blockchain
learning (artificial intelligence)
machine learning
machine learning services
medical information systems
Medical services
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
biblio
Enhance Wireless Security System Using Butterfly Network Coding Algorithm
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
IoT system
wireless sensing network
wireless security system
Wi-Fi module
traditional security system
system indicators
Received signal strength indication (RSSI)
received signal strength indication
network transmission
Network node routing
butterfly network coding algorithm
Butterfly network coding (BNC) algorithm
cyber physical systems
telecommunication security
encoding
network coding
Predictive Metrics
security monitoring
wireless LAN
Decoding
RSSI
wireless sensor networks
composability
pubcrawl
Resiliency
Internet of Things (IoT)
1
2
next ›
last »