Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tunneling
biblio
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
Systems architecture
tunneling
T-Mobile
SSH tunneling
SIM Hijacking
Scanning and Enumeration
identity theft
passwords
brute force attacks
Brute force
collaboration
cyber attack
Force
Data Breach
Databases
policy-based governance
Human Factors
Human behavior
pubcrawl
Computer hacking
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
Detection of Exfiltration and Tunneling over DNS
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
IP networks
tunneling
Servers
Scalability
Resiliency
resilience
pubcrawl
Monitoring
Metrics
Measurement
malware
malicious purposes
machine learning models
machine learning
learning (artificial intelligence)
advanced persistent threat attacks
IOC
invasive software
information exfiltration
indicator of compromise
Human behavior
exfiltration
encoding
domain name system
DNS tunnel
DNS
command and control systems
command & control servers
C&c
advanced persistent threats
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by K_Hooper on Wed, 09/27/2017 - 1:21pm
Ad hoc networks
detection
Human behavior
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
Resiliency
scalabilty
security
tunneling
wormhole attack
biblio
Detection of Tunnels in PCAP Data by Random Forests
Submitted by grigby1 on Tue, 08/22/2017 - 12:16pm
composability
Cyber Attacks
machine learning
privacy
pubcrawl
random forests
Resiliency
tunneling
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by grigby1 on Wed, 08/02/2017 - 1:40pm
detection
manet attack prevention
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
security
tunneling
wormhole attack
biblio
"Circuit design to improve security of telecommunication devices"
Submitted by grigby1 on Tue, 02/14/2017 - 12:28pm
military forces
tunneling
TETRA
Telecommunication standards
telecommunication security
telecommunication devices
telecommunication device security
Telecommunication
SusTech
security
radio networks
radio equipment
pubcrawl170102
project 25
5G mobile communication
Iron
GSM
exclusive channel
encryption
economical circuit
Design Circuit
Cryptography
Conferences
coding
circuit design
attackers
Artificial Intelligence
accidental damage