Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
man-in-the-middle attack
biblio
MPTCP-based Security Schema in Fog Computing
Submitted by grigby1 on Fri, 03/17/2023 - 10:20am
Fog computing
security
Cloud Computing
Computational modeling
Fog-Computing Security
IoT security
Linux
man-in-the-middle attack
Multipath-TCP
performance evaluation
pubcrawl
resilience
Resiliency
resource management
software defined network security
Technological innovation
biblio
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
Submitted by grigby1 on Fri, 08/12/2022 - 4:34pm
cyber-physical system
energy measurement
Europe
False-Data-Injection
Laboratories
man-in-the-middle attack
network topology
performance evaluation
process control
Smart Grid Cyber Security
command injection attacks
pubcrawl
composability
Resiliency
Metrics
Smart Grids
biblio
Secure Key Exchange by NFC for Instant Messaging
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
operating systems
Upper bound
standards
Servers
Scalability
Resiliency
resilience
pubcrawl
Protocols
android encryption
Metrics
man-in-the-middle attack
Key exchange
Instant messaging
Human behavior
End-End Encryption
encryption
Elliptic Curve Diffie-Hellman
biblio
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
Receivers
man-in-the-middle attack
man-in-the-middle attacks
Metrics
personal data disclosure
personally identifiable information
PII
policy-based governance
privacy
pubcrawl
Python
Information Assurance
reputation
resilience
Resiliency
Scalability
Self-Sovereign Identity
self-sovereign identity agents
Sensitivity
user autonomy
user immutability
Data disclosure
attribute sensitivity score model
authorisation
blockchain
blockchains
collaboration
composability
confidence level
credential exchange
credential exchanges
attribute sensitivity
data privacy
distributed ledger
Engines
Human behavior
Hyperledger Indy
Hyperledger Indy blockchain
identity holders
identity operations
identity owners
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
man-in-the-middle attack
Signing
sender identity
security
Scalability
Resiliency
public key cryptography
Public key
pubcrawl
private key cryptography
message integrity
message authentication
authentication
integrity
encryption
digital world
digital signatures
digital signature
digital era
cyber-attacks
Cryptography
cryptographic key pairs
confidentiality
Conferences
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
biblio
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
secret challenge-response pair
identity based encryption
Intel Edison board
IoT node
IP-spoofing
key exchange protocol
Keyed hash function
password dependency
protocol resists
PUF based authentication
Digilent Nexys-4 FPGA board
secured video surveillance camera
Session Key Security
stand-alone video camera
standard network penetration tools
traditional authentication protocols
universal composability framework
verifier database
composability
physically unclonable functions
Internet of Things
Hardware
Cryptographic Protocols
Protocols
pubcrawl
Databases
authentication
message authentication
encryption
Elliptic curve cryptography
Cameras
device authentication
man-in-the-middle attack
IoT infrastructure
pufs
key management
Artix-7 FPGA
biblio
An Overview of Security in CoAP: Attack and Analysis
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
network servers
Constrained Application Protocol (CoAP)
Copper
cross-protocol attacks
datagram transport layer security
Datagram Transport Layer Security (DTLS)
denial of service
Denial of Service (DoS) attacks
DoS
DTLS
man-in-the-middle attack
CoAP security attack
peak security issues
proxy
Relay Attacks
replay attacks
request for comments 7252
RFC 7252
smart ecosystems
UDP
User Datagram Protocol (UDP)
Web transfer protocols
secure protocol
Internet of Things
security
Servers
pubcrawl
Human behavior
Metrics
resilience
IoT devices
telecommunication security
Protocols
computer architecture
composability
Browsers
Compositionality
Browser Security
authentication mechanism
Constrained Application Protocol
Internet of Things (IoT)
application layer protocol
channel security
client-server architecture
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
1
2
next ›
last »