Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
spoofing
biblio
The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network
Submitted by grigby1 on Fri, 03/31/2023 - 11:27am
denial of service
bitcoin security
misbehavior
sybil
spoofing
P2P Networking
Ban Score
consensus protocol
Human Factors
security
bitcoin
Prototypes
Scalability
Human behavior
pubcrawl
Peer-to-peer computing
Anomaly Detection
biblio
Testing the Resiliency of Consumer Off-the-Shelf Drones to a Variety of Cyberattack Methods
Submitted by grigby1 on Fri, 03/17/2023 - 10:20am
Rotors
unmanned aerial systems
MITM
Drone
UAS
distributed denial-of-service
man-in-the-middle
spoofing
Frequency measurement
Government
pubcrawl
Cybersecurity
DDoS
network security
Computer crime
cyberattack
Protocols
Safety
Resiliency
resilience
biblio
P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4
Submitted by grigby1 on Fri, 02/24/2023 - 5:30pm
composability
ICMPv6
Flooding
P4
spoofing
denial-of-service attack
IPv6
DDoS
Policy Based Governance
Switches
collaboration
Prototypes
Protocols
internet
Safety
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Security Analyses of Misbehavior Tracking in Bitcoin Network
Submitted by grigby1 on Wed, 06/15/2022 - 10:56am
research and development
bitcoin security
sybil
spoofing
P2P Networking
DoS attack
Ban Score
denial-of-service attack
cryptocurrency
blockchain
bitcoin
Prototypes
Scalability
Conferences
Human behavior
pubcrawl
Peer-to-peer computing
biblio
How Many Orders Does a Spoofer Need? - Investigation by Agent-Based Model -
Submitted by grigby1 on Mon, 11/29/2021 - 1:32pm
Agent-Based Model
Artificial Stock Market Model
Computational modeling
Fluctuations
Human Factors
illegal trades
pubcrawl
Scalability
Social Agents
social computing
spoofing
stock markets
Unfair Trades
biblio
Detecting Malware Attack on Cloud using Deep Learning Vector Quantization
Submitted by grigby1 on Thu, 05/13/2021 - 12:21pm
performance evaluation
vector quantization
UDP
spoofing
Servers
Scalability
ResNet
Resiliency
resilience
pubcrawl
Attack vectors
Microprogramming
Memcached
injected code
Human behavior
Deep Learning Vector Quantizarion
deep learning
DDoS Attack
Computer crime
Cloud Computing
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
Multi-receiver GPS Spoofing Detection: Error Models and Realization
Submitted by grigby1 on Fri, 05/19/2017 - 1:58pm
Compositionality
countermeasure
GPS
Human behavior
localization security
location privacy
Metrics
pubcrawl
Resiliency
spoofing
wireless networks
biblio
Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
Submitted by grigby1 on Mon, 04/03/2017 - 11:52am
ADS-B
air traffic control
composability
Intrusion Detection
Metrics
multilateration
Physical layer
physical layer security
physical-layer
physical-layer security
pubcrawl
Resiliency
spoofing