Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security challenges
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
Operational Data Based Intrusion Detection System for Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 1:06pm
remote monitoring
Monitoring
Operational Data
operational data based intrusion detection system
pervasive control
policy-based governance
power engineering computing
power generation
power system security
privacy
Protocols
pubcrawl
Metrics
resilience
Resiliency
Scalability
security challenges
security of data
Smart Grid
smart grid consumer privacy
smart meters
smart power grids
smart technologies
utility companies
electrical grid
anomaly-based IDS
collaboration
complex data representation
composability
Computer crime
cyberattacks
Cybersecurity
cyberthreats
deep learning
distributed generation
distributed power generation
Anomaly Detection
electricity
energy consumers
Human behavior
industrial control
Industrial Control Systems
information and communication technology
Internet of Things
intrusion detection system
IoT
learning (artificial intelligence)
machine learning
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes
Submitted by aekwall on Mon, 05/04/2020 - 10:15am
Safe-Guarding Home IoT Environments
user-comprehensible solution
user-centric cyber security
transparent cyber security environment
re-configurable solutions
Personalised Real-time Risk Control
multilayered architecture
IoT-based smart homes
IoT smart home residents
H2020 European research project GHOST
GHOST security framework
disruptive software-enabled network security solutions
cyber security services
cyber security architecture
architectural layers
Network Security Architecture
Computer crime
Cyber Attacks
security challenges
Smart Home
home automation
reference architecture
Smart homes
Logic gates
IoT security
privacy
pubcrawl
Resiliency
computer architecture
Protocols
Internet of Things
computer network security
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 11:56am
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
biblio
A Defense Mechanism for DoS Attacks in SDN (Software Defined Network)
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
Resiliency
software defined networking
Software Defined Network
security threats
security challenges
SDN security
SDN architecture
Scalability
S-FlowRT
computer network management
resilience
pubcrawl
network security
heterogeneous networks
DoS(Denial of Service)
DoS attacks
denial of service attack
computer network security
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
A Learning Kit on IPv6 Deployment and Its Security Challenges for Neophytes
Submitted by grigby1 on Tue, 01/21/2020 - 11:09am
Personnel
Training
tools
Software
self-learning
security model
security challenges
security
Resiliency
resilience
pubcrawl
Protocols
pre-alpha testing
policy-based governance
collaboration
Organizations
network security
neophytes
neophyte
Metrics
learning kit
IT personnel
ipv6 security
IPv6 environment
IPv6 deployment
IP networks
computer network security
composability
biblio
Analysis of Identity Management Systems Using Blockchain Technology
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
internet
User control
uPort
Sovrin
ShoCard
Self-Sovereign Identity
security challenges
Scalability
resilience
pubcrawl
privacy
Peer-to-peer computing
authorisation
identity management systems
Identity management
Human behavior
Distributed databases
Digital identity
data privacy
Cryptography
blockchain technology
blockchain infrastructures
blockchain
Biological system modeling
1
2
3
next ›
last »