Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
proxy
biblio
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
digital signature
Cryptography
Computational modeling
Elliptic curve cryptography
Mobile handsets
hashing
digital signatures
mobile
ECC
Elliptic curves
Scalability
proxy
PKI Trust Models
Cloud Computing
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
biblio
Predicting Cyber Attacks in a Proxy Server using Support Vector Machine (SVM) Learning Algorithm
Submitted by aekwall on Wed, 03/23/2022 - 9:21am
Predictive Metrics
vector
support
server
proxy
machine
learning
Computers
programming
security
Prediction algorithms
DoS
composability
Resiliency
pubcrawl
Servers
Support vector machines
Task Analysis
biblio
An Overview of Security in CoAP: Attack and Analysis
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
network servers
Constrained Application Protocol (CoAP)
Copper
cross-protocol attacks
datagram transport layer security
Datagram Transport Layer Security (DTLS)
denial of service
Denial of Service (DoS) attacks
DoS
DTLS
man-in-the-middle attack
CoAP security attack
peak security issues
proxy
Relay Attacks
replay attacks
request for comments 7252
RFC 7252
smart ecosystems
UDP
User Datagram Protocol (UDP)
Web transfer protocols
secure protocol
Internet of Things
security
Servers
pubcrawl
Human behavior
Metrics
resilience
IoT devices
telecommunication security
Protocols
computer architecture
composability
Browsers
Compositionality
Browser Security
authentication mechanism
Constrained Application Protocol
Internet of Things (IoT)
application layer protocol
channel security
client-server architecture
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
proxy
TLS
telecommunication security
SMGW-based secure communication control
smart power grids
smart meters
smart meter gateways
smart meter gateway
Smart Grids
smart grid security
Smart Grid
security
Scalability
Resiliency
Receivers
pubcrawl
case-specific security settings
privacy
power system security
power engineering computing
policy language
performance evaluation
network servers
Metrics
Logic gates
internetworking
Internet of Things
Data protection
critical smart grid infrastructure
communication security control
communication security
communication protection
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs
Submitted by grigby1 on Thu, 05/24/2018 - 12:27pm
Control Theory
privacy
causal analysis
Measurement
Metrics
privacy models
proxy
pubcrawl
use privacy
biblio
Trust but Verify: Auditing the Secure Internet of Things
Submitted by grigby1 on Mon, 03/26/2018 - 12:56pm
resilience
web of trust
user privacy in the cloud
User behavior
Transport Layer Security
TLS-rotate and release
TLS-RAR
TLS 1.3
TLS
Scalability
Resiliency
auditing
pubcrawl
proxy
Networked Control Systems Security
Middlebox
Metrics
IoT
Internet of Things
Decrypt
composability
biblio
Open Source Based Privacy-Proxy to Restrain Connectivity of Mobile Apps
Submitted by K_Hooper on Wed, 10/25/2017 - 11:55am
Human behavior
Mobile Apps
privacy
Privacy Policies
proxy
pubcrawl
Scalability
security
sensitive information
biblio
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection
Submitted by grigby1 on Tue, 10/03/2017 - 11:46am
botnet
botnets
frequency domain
Human behavior
logs
Metrics
mining
proxy
pubcrawl
Resiliency
Scalability
1
2
next ›
last »