Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Network
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
Hybrid Approach to Detect Network Based Intrusion
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
inference mechanisms
intrusion tolerance
PSO algorithm
population stochastic technique
network based intrusion
intrusion detection techniques
internet based communication
hybrid particle swarm optimization fuzzy rule based inference engine
host
Fuzzy
artificial intelligence systems
network intrusion detection system
Stochastic processes
genetic algorithms
Artificial Intelligence
security of data
Network
computer science
Fuzzy logic
Intrusion Detection
Anomaly Detection
internet
PSO
particle swarm optimisation
composability
pubcrawl
Resiliency
feature extraction
IDS
biblio
Ransomware Threat and its Impact on SCADA
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Ransom
Device Compromising
Downtime
Encrypting
human machine interface
ICs
Industrial Control Systems
industrial networks
industrial processes
Infected System
Locker
malicious software
Network
operation technology
Petya
programmable logic controllers
Data Mitigation
Ransomware
ransomware attack
Ransomware Deadline
Ransomware Incidents
Ransomware Prevention
Ransomware Strategies
Ransomware Taxonomy
ransomware threat
Ransomware Threating
Remote Terminal Units
SCADA systems
supervisory control and data acquisition
Threat report
WannaCry
cryptocurrency
invasive software
Cybersecurity
pubcrawl
Metrics
Resiliency
resilience
Human behavior
Computer crime
malware
Human Factors
control engineering computing
industrial control
information security
cybercrimes
production engineering computing
cryptojacking
business productivity
Coin Miner
critical infrastructure
critical infrastructures
Cryptor
Cyber Actor
cyber attack
cyber threat
cyber-attack incidents
cybercriminals
Data and System Access
Data Backup
Data Extortion
biblio
Middleware Based Node Authentication Framework for IoT Networks
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
node authentication framework
wireless sensor networks
security of data
security mechanism
security
Resiliency
resilience
pubcrawl
policy-based governance
authentication
Network
middleware security
middleware
IoT networks
Internet of Things
internet
Conferences
composability
biblio
Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation
Submitted by grigby1 on Fri, 05/22/2020 - 2:08pm
Internet of Things
transparency
tracking
security
Resiliency
resilience
pubcrawl
network accountability
Network
Metrics
IoT device mesh network
IoT
accountability
Immutable
heterogenous IoT networks
Heterogenous
enterprise business use
Distributed databases
Digital Forensics
Cryptography
composability
blockchain technology
blockchain
biblio
Security Testing Of Active Optical Network Devices
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
passive exploration
tools
testing devices
testing
tested polygon
security testing
security
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Penetration Testing
Passive optical networks
active exploration
Optical network units
optical fibre networks
optical
Network reconnaissance
Network
Linux
Kali Linux
huawei
gpon
conducted testing
computer network security
analysis
active optical network devices
biblio
Development of IIoT Monitoring and Control Security Scheme for Cyber Physical Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:05am
security
Monitoring
Scalability
Internet of Things
Protocols
Resiliency
pubcrawl
Fans
CPS
Network
Heating systems
iiot
Security by Default
biblio
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
BitTorrent
peer to peer security
resource management
peer-to-peer networks
P2P protocol
network infrastructure
Leecher-to-Leecher transactions
incentive-based security model
incentive security model
incentive methods
Gnutella
fairness
computer network security
Network
Human Factors
Scalability
Metrics
Peer-to-peer computing
Protocols
pubcrawl
Resiliency
computer network management
security
Cryptography
biblio
Wireless Sensor Networks Security: Case study
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
sensor security
wireless sensor networks security
sensor data detection
Sensor
network physical devices
live monitoring
data exchange
data
Network
power consumption
wireless
Elliptic curve cryptography
Data collection
IoT
secure communication
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
encryption
Cloud Computing
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »