Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
false alarm
biblio
Triggering and Auditing the Event During Intrusion Detections in WSN’s Defence Application
Submitted by aekwall on Tue, 04/27/2021 - 12:28pm
Scalability
Conferences
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
Intelligent sensors
sensors
Pins
Base stations
Security Audits
Defence Applications
false alarm
Security-Event Auditing
wireless sensor networks (WSNs)
biblio
Crypto-Aided Bayesian Detection of False Data in Short Messages
Submitted by grigby1 on Mon, 12/30/2019 - 1:21pm
Human behavior
Wireless communication
signal processing
short messages
Resiliency
resilience
Relays
pubcrawl
probability
Physical layer
missed detection
maximum a posteriori probability rule
Map
low overhead
low latency
lightweight cryptographic detection
Bayes methods
False Data Injection
False Data Detection
false data
false alarm
Electrostatic discharges
detection outcomes
detection error
detection accuracy
cyber physical systems
Cryptography
cryptographic detection
crypto-aided Bayesian detection framework
Conferences
composability
Bayesian detection
biblio
The positive force of deterrence: Estimating the quantitative effects of target shifting
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
counter piracy
Terrorism
target shifting
stopping performance
Radiation detectors
low performance security
game theoretic approach
force multiplier
Force measurement
false alarm
deterrence force
counterterrorism
security of data
Deterrence
risk analysis
protection system
resilience
uncertainty
Force
pubcrawl
Human behavior
game theory
Scalability
biblio
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Ports (Computers)
zero day detection
Zero day attacks
testing
Software
SNIDS
signature based network intrusion detection
Servers
Reliability
Code injection
Payloads
NIDS
false alarm
exploits
digital signatures
computer security
computer network security
computer architecture