Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security problem
biblio
Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
denial-of-service attack
mode-switching DoS attacks
k-connected graph
k-connected communication topology
DoS attack modes
distributed secure control
distributed event-triggered controller
distributed controller independent
distributed control schemes
denial-of-service (DoS) attacks
Decentralized Control
construction algorithm
CPSS
attack graphs
denial-of-service attacks
cyberattack
distributed control
telecommunication control
Communication channels
Laplace equations
Predictive Metrics
telecommunication network topology
Topology
security problem
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
computer network security
biblio
Link Prediction Adversarial Attack Via Iterative Gradient Attack
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
gradient information
attack graphs
adversarial attack
adversarial graph
deep models
defense
GAE
gradient attack (GA)
gradient attack strategy
gradient methods
graph autoencode
graph evolved tasks
iterative gradient attack
Link prediction
link prediction adversarial attack problem
node classification
real-world graphs
trained graph autoencoder model
Robustness
data privacy
Task Analysis
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
privacy
security of data
neural nets
Prediction algorithms
security problem
Predictive models
Predictive Metrics
deep neural networks
Perturbation methods
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
security mechanism
RFIDs
traditional RSA public key cryptography
storage space
RFID system
RFID information security technology
RFID information security
potential security hazard
hardware conditions
elliptic curve algorithms
elliptic curve algorithm
encryption
radiofrequency identification
Elliptic curves
Elliptic curve cryptography
security problem
public key cryptography
Mathematical model
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
An Approach for Sending a Confidential Message to the Restricted Users in Defence Based Organization
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
group key
Secure File Sharing
resilience
Resiliency
pubcrawl
user list
untrusted cloud storages
third-party applications
storage node
spammer
security problem
secure platform
profiling users
personal information
group member communication
Group Manager
Cryptography
file transfer
file sharing process
dynamic broadcasting encryption
defense-based organization
defense networks
defense network
defence based organization
decryption
confidential message
storage management
Organizations
Public key
Cloud Computing
Access Control
encryption
biblio
A Security Problem in Cloud Auditing Protocols
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
auditing
Security Audits
subverted auditing protocol instantiation
subverted auditing frame
subversion attack
publity
PRISM
Mikhail Bellare
cloud auditing protocols
cloud auditing protocol
basic security model
Cloud Computing
secret information
Scalability
cloud server
security problem
pubcrawl
Human behavior
Resiliency
data owner
Cryptography
biblio
Dynamic programming for solving unit commitment and security problems in microgrid systems
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
renewable energy
Microgrids
power generation dispatch
power generation economics
power generation planning
power generation scheduling
power system security
pubcrawl
Reliability
microgrid systems
Resiliency
security
security problem
Smart Grid
Smart Grids
UC problem
unit commitment
unit commitment problem
energy management systems
composability
distributed generation
distributed power generation
DP
dynamic programming
dynamic programming algorithm
Dynamical Systems
electrical energy
batteries
generation system
Heuristic algorithms
MATLAB software
MCEMS
Metrics
microgrid
microgrid central energy management system
biblio
Email-Based Password Recovery - Risking or Rescuing Users?
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
resilience
Web sites
web services
user instructions
user authentication
usability
Unsolicited electronic mail
telecommunication security
System recovery
shared secret
security problem
secret passwords
secret link
Resiliency
authentication
pubcrawl
password recovery email
password recovery
password
message authentication
entire user-website relationship
English language websites
email-based password recovery
email content
Electronic mail
content issues
content and design of email-based password recovery
authorisation
biblio
SAODV: Black hole and gray hole attack detection protocol in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:30am
secure AODV protocol
open nature
Peer-to-peer computing
Protocols
pubcrawl
radio links
resilience
Resiliency
SAODV
mobile nature
security attacks
security problem
standards
telecommunication security
Throughput
wireless links
wireless mobile nodes
Ad hoc networks
mobile computing
mobile ad hoc networks
Metrics
MANET
malicious node
gray hole attacks
gray hole attack detection protocol
Gray hole attack
forwarding packets
delays
Cryptographic Protocols
Compositionality
Black hole attack
Attack detection
AODV
biblio
Trustworthy reconfigurable access to on-chip infrastructure
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
security
reconfigurable scan network
reconfigurable scan networks
Registers
Resiliency
RSN
scan pattern generation method
secure DFT
secure pattern retargeting
pubcrawl
security problem
system-on-chip
trustworthiness
trustworthy access pattern generation
trustworthy access sequences
trustworthy data transmission
trustworthy reconfigurable access
Trustworthy Systems
IEEE Std 1500
composability
cyber physical systems
data communication
embedded systems
external interfaces
Hardware Security
IEEE standards
IEEE Std 1149
access mechanisms
IEEE Std 1687
IJTAG
Instruments
integrated circuit testing
JTAG
Latches
Multiplexing
on-chip embedded infrastructure
1
2
next ›
last »