Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
insecure networks
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 10:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
biblio
Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust
Submitted by aekwall on Mon, 11/18/2019 - 10:48am
public keys
centralized transparency
centrally-managed PKI
Conifer
CONIKS
cryptographic identities
domain names
highly decentralized trust
insecure networks
central trusted parties
secure distributed ledger
secure naming systems
security guarantees
traditional centralized PKIs
traditional centralized-trust systems
trustworthy binding
user-facing names
PKI Trust Models
internet
Scalability
secure communications
Resiliency
Human behavior
pubcrawl
bitcoin
Metrics
blockchain
Monitoring
data structures
Public key
public key cryptography
flexibility
active attackers
blockchain-agnostic way
blockchain-rooted trust
blockchains
biblio
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
Submitted by grigby1 on Fri, 02/08/2019 - 3:21pm
image encryption
symmetric encryption scheme
statistical attack
serpent-elliptic hybrid cryptosystem
Serpent algorithm
SERPENT
Resiliency
resilience
public key cryptography
pubcrawl
Multimedia systems
multimedia protection
Metrics
insecure networks
insecure channel
information security
Asymmetric Encryption
hybrid cryptosystem
Human behavior
encryption quality
encryption
Elliptic curves
Elliptic curve cryptography
differential attack
data encapsulation scheme
data encapsulation
Correlation
Compositionality
composability
asymmetric schemes key distribution
asymmetric encryption scheme
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks