Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication security
biblio
A Decentralized Reputation Management System for Securing the Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
reputation-based security approaches
locally-perceived behavioral reputation parameters
malicious vehicles
Metrics
networking model
Peer-to-peer computing
Protocols
pubcrawl
reputation metrics
reputation system
IoV network
Resiliency
road conditions
road safety
Roads
security
VANET environment
VANET Security
vehicular ad hoc networks
faulty vehicles
communication protocols
communication security
Computational modeling
computer network security
Cryptography
cryptography techniques
cyber physical systems
decentralized reputation
decentralized reputation management system
Acceleration
fully decentralized fashion
Human behavior
Human Factors
Industries
interconnected vehicular system
internet
Internet of Vehicles
Internet of Vehicles paradigm
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
Cooperative Key Generation for Data Dissemination in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
Protocols
wireless sensor networks
wireless security
wireless fading channel
Wireless communication
wireless channels
telecommunication security
shared randomness
sensory data
secret key generation protocol
secret bit mismatch
real-time data dissemination
radio channels
quantized fading channel randomness
Quantization (signal)
pubcrawl
2-hop wireless sensor network testbed
privacy
Human Factors
Human behavior
fading channels
Experimental Evaluation
data dissemination
cyber-physical systems
cyber physical systems
Cryptographic Protocols
CPS Privacy
CPS
confidentiality
Communication system security
communication security
biblio
A Secure and Power-Efficient Constellations for Physical Layer Security
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
communication security
wireless networks
wireless channels
symmetrical constellations
symbol error rate performance
SER performance
power-efficient constellations
power-efficiency
polarization modulation
Monte Carlo simulation
Monte Carlo methods
double-layer constellations
double layers constellations
telecommunication security
8
4
16-order double-layer constellations
physical layer security
error statistics
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
proxy
TLS
telecommunication security
SMGW-based secure communication control
smart power grids
smart meters
smart meter gateways
smart meter gateway
Smart Grids
smart grid security
Smart Grid
security
Scalability
Resiliency
Receivers
pubcrawl
case-specific security settings
privacy
power system security
power engineering computing
policy language
performance evaluation
network servers
Metrics
Logic gates
internetworking
Internet of Things
Data protection
critical smart grid infrastructure
communication security control
communication security
communication protection
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
chaotic encryption
two encryption levels
SSSNR
speech processing
signal denoising
secure speech communication system
scrambling
public channels
MatLab simulation
masking
communication security
Chaotic systems
chaotic scrambling and masking
chaotic scrambling
chaotic masking
Chaotic maps
Cryptography
channel problems
Transmitters
chaotic cryptography
chaotic communication
Predictive Metrics
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
telecommunication security
Receivers
encryption
biblio
Research on Multi-Source Data Security Protection of Smart Grid Based on Quantum Key Combination
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
Quantum mechanics
power engineering computing
Power Grid
Predictive Metrics
pubcrawl
quantum cryptography
quantum communication
quantum computing security
quantum key combination
power data protection
resilience
Resiliency
Scalability
segmentation and combination of key
segmentation technology
Smart Grid
smart power grids metrics
Business
power communication network
multisource data security protection
Microelectronics Security
Microelectronics
Metrics
key updating
key segments
encryption
Data protection
composability
communication terminals
communication security
combination technology
business terminals
business data
biblio
Investigating and securing communications in the Controller Area Network (CAN)
Submitted by grigby1 on Wed, 09/05/2018 - 10:55am
automobile
controller area network security
telecommunication networks
standard communication network
light emitting diodes
field buses
denial-of-service attacks
controller area networks
controller area network
CAN-related systems
CAN protocol security features
CAN bus nodes
CAN
broadcast communications network
broadcast communication
security
DoS attacks
telecommunication computing
resilience
automobiles
Network
computer network security
message authentication
Conferences
Protocols
communication security
authentication
Resiliency
pubcrawl
« first
‹ previous
1
2
3
next ›
last »