Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication protocol
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
Clocks
wireless security
wireless communication scheme
transmitters identification
Software Defined Radios
physical-layer fingerprinting approach
low cost SDR
communication protocol
Bluetooth scan
Bluetooth devices fingerprinting
authentication layer
software radio
bluetooth security
Bluetooth
Physical layer
Synchronization
fingerprint identification
composability
Wireless communication
Communication system security
Protocols
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
biblio
SysTaint: Assisting Reversing of Malicious Network Communications
Submitted by aekwall on Mon, 06/24/2019 - 1:40pm
botnet
communication protocol
Human behavior
Malware Analysis
Metrics
pubcrawl
Resiliency
software reverse engineering
Virtualization
biblio
SEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical Embedded Systems
Submitted by aekwall on Wed, 05/01/2019 - 11:42am
pubcrawl
trustcenter
SEnSE
security
secure integration
secure and safe embedded
safety-critical software
safety-critical embedded systems
Safety
safe interaction
safe integration
Runtime
Resiliency
recertification
architecture
performance evaluation
Metrics
embedded systems
Embedded System
dynamic system
cyberphysical system
cyber-physical systems
contract-based development
composability
communication protocol
cloud application
automobiles
authorization
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
biblio
An architecture model for smart city using Cognitive Internet of Things (CIoT)
Submitted by grigby1 on Wed, 05/16/2018 - 12:41pm
smart cities
MEMS
Protocols
pubcrawl
radio frequency identification
resilience
Resiliency
RFID
RFIDs
Servers
massive volume
Smart City
smart devices
smart features
social aspects of automation
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
Data integration
central server
centralized server
CIoT
cognitive Internet of Things
cognitive radio
communication protocol
data analysis
Data collection
architecture model
Data processing
distributed architecture
heatmap
Human behavior
human factor
Internet of Things
IoT
IoT data
biblio
The APT detection method in SDN
Submitted by K_Hooper on Wed, 05/09/2018 - 9:51am
OpenFlow
Switches
software programming
software defined networking
SDN security
SDN controller plane
SDN
Scalability
Resiliency
pubcrawl
process control
APT
network framework
HMM
Hidden Markov models
Discrete Fourier transforms
data plane
computer network security
Computer crime
communication protocol
APT detection method
biblio
CENTRA: CENtrally Trusted Routing vAlidation for IGP
Submitted by grigby1 on Wed, 04/11/2018 - 2:03pm
routing policies
PKI
practical Internet
pubcrawl
public key cryptography
public key infrastructure
real-time systems
resilience
Resiliency
Routing
routing monitoring systems
OSPF
Routing protocols
Scalability
SDN
secure routing mechanism
secure routing policy
Software Defined Network
software defined networking
Trust Routing
trusted routing
YANG
IGP
anomalous routing detection
Anomaly Detection
authentication
CENTRA
Centrally Controlling
CENtrally Trusted Routing vAlidation framework
communication protocol
composability
computer network security
Data Model
anomalous routing blockage
interior gateway protocols
internet
Internet service providers
internetworking
ISP
knowledge base-this
Monitoring
Neighbor
NETCONF
network security
biblio
A Communication Security Protocol for Ubiquitous Sensor Networks
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
Metrics
wireless sensor networks
ubiquitous sensor networks
ubiquitous network system
Ubiquitous Computing Security
ubiquitous computing
telecommunication security
security
Scalability
Resiliency
Public key
pubcrawl
Protocols
privacy
Access Credential
Medical services
Logic gates
key exchange computation process
information technology
Human Factors
Human behavior
gateway
Cryptography
cryptographic access
communication security protocol
communication protocol
cipher content
authentication
biblio
A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL designs
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
high level functionality verification
unified sequential equivalence checking approach
Sequential equivalence checking
sequence of states
RTL design verification
RTL design
Protocols
protocol specification implementation
Integrated circuit modeling
high-level models
high level synthesis
high level reference model
high level model
Abstracts
formal verification
formal technique
Formal Specification
electronic design automation
Educational institutions
design verification
design under verification
Data models
Computational modeling
computational margin
communication protocol
Calculators
biblio
SAFE: Security-Aware FlexRay Scheduling Engine
Submitted by BrandonB on Wed, 05/06/2015 - 1:13pm
FlexRay static segment schedule
X-by-wire system
telecommunication security
security-aware FlexRay scheduling engine
scheduling
Safety
Safe
Runtime
Protocols
mobile radio
active safety functions
field programmable gate arrays
end-to-end latencies
communication protocol
communication middleware
Automotive engineering
automotive electronics
automotive electrical-electronic systems
automotive domain
authentication