Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cascading style sheets
biblio
Algebraic Signature Based Data Possession Checking Method with Cloud Storage
Submitted by grigby1 on Wed, 06/30/2021 - 3:27pm
Metrics
the forward error-correcting code
Servers
security
Resiliency
resilience
Reliability
pubcrawl
Protocols
algebraic signature
forward error correction
error correction codes
encoding
data possession checking
composability
cloud storage
Cloud Computing
Cascading style sheets
biblio
On the Impact of SSDF Attacks in Hard Combination Schemes in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
MAJORITY-rule
critical threats
CSS
different hard-decision fusion schemes
fusion center
hard combination schemes
hard data
hard data combining
hard-decision combination
hard-decision fusion scheme
licensed frequency bands
cooperative spectrum sensing
malicious user
miss detection
OR-rule
Primary User spectrum accessibility
PU
Spectrum Sensing Data Falsification reports
SSDF attacks
user performs Energy Detection
Cognitive Radio Security
cooperative communication
Resiliency
pubcrawl
Signal to noise ratio
probability
collaboration
Bandwidth
Interference
radio networks
sensors
telecommunication security
signal detection
Cascading style sheets
malicious users
radio spectrum management
cognitive radio
cognitive radio networks
detection performance
AND-rule
AYMU attacks
biblio
Optimized Spectrum sensing Techniques for Enhanced Throughput in Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 12:02pm
added delay
Cognitive Radio Security
wireless communication system
wireless applications
transmission delay
throughput optimization
spectrum scarcity
Sensing throughput tradeoff
secondary users
primary users security
optimized spectrum sensing techniques
optimal sensing time
finite resource
enhanced throughput
Cooperative Spectrum Sensing(CSS)
Cognitive Radio Network
software defined radio
cognitive radio networks
cognitive radio
signal quality
radio spectrum management
Cascading style sheets
signal detection
Throughput
sensors
software radio
radio networks
Signal to noise ratio
optimization
pubcrawl
Resiliency
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 1:35pm
reference CSB system
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
fault tolerance
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
cloud security system
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
API interoperability issues
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
biblio
Cross-Site Scripting for Graphic Data: Vulnerabilities and Prevention
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
Scalability
XSS vulnerabilities
XSS attacks
XSS
XML treatment method
XML
white list.
websites
Web sites
Vulnerability
testing
TES
SVG image
SVG
security of data
Cross Site Scripting
resilience
pubcrawl
malware
Human behavior
graphical content
graphic content
cross-site scripting
Computer graphics
code
Cascading style sheets
black list
attack
animation
Resiliency
biblio
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless network systems
underutilized spectrum
telecommunication security
spectrum congestion
spectrum bands
signal detection
sensors
security measure
security
Resiliency
resilience
radio spectrums
radio spectrum management
Radio spectrum
Ad hoc networks
network leading interference
legitimate cognitive radios
Interference
data communications
cooperative communication
Consensus algorithm
Cognitive Radio Security
cognitive radio ad-hoc networks
cognitive radio
Cascading style sheets
byzantine attack mitigation scheme
byzantine attack
attack-proof cooperative spectrum sensing
biblio
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
provable data possession
Metrics
non-repudiation
nonrepudiable PDP scheme
nonrepudiable provable data possession scheme
nonrepudiation issue
outsourced data
private auditability
private verifier
human factor
pubcrawl
Repudiation
resilience
Resiliency
security
Servers
storage management
associated tags
Human behavior
DV-PDP schemes
digital signatures
designated verifier
Data models
Data mining
data integrity
concrete DV-NRPDP scheme
Computational modeling
composability
cloud storage systems
cloud storage server
cloud storage
Cloud Computing
Cascading style sheets
biblio
A game-theoretic approach for minimizing security risks in the Internet-of-Things
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
optimal prosumer set
user data theft
two player game
Silicon
security risk minimization
security of data
security
pubcrawl170108
pubcrawl170107
prosumers selection Game
Cascading style sheets
noncooperative game
Nash prosumers selection
Nash Equilibrium
Internet of Things
Games
game theory
decision support
Conferences