Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MITM
biblio
Testing the Resiliency of Consumer Off-the-Shelf Drones to a Variety of Cyberattack Methods
Submitted by grigby1 on Fri, 03/17/2023 - 9:20am
Rotors
unmanned aerial systems
MITM
Drone
UAS
distributed denial-of-service
man-in-the-middle
spoofing
Frequency measurement
Government
pubcrawl
Cybersecurity
DDoS
network security
Computer crime
cyberattack
Protocols
Safety
Resiliency
resilience
biblio
Cyber Security Actionable Education during COVID19 Third Wave in India
Submitted by grigby1 on Fri, 03/03/2023 - 8:23am
resilience
DNS spoofing
passwords
Linux Operating System Security
COVID-19
ARP Spoofing
network intrusion detection
MITM
Wireshark
education
cyber security
Compositionality
domain name system
Linux
composability
Protocols
Resiliency
Metrics
pubcrawl
biblio
Global Internet Traffic Routing and Privacy
Submitted by grigby1 on Wed, 08/11/2021 - 3:02pm
internet
ip privacy
BGP Injection
MITM
Virtual private networks
SDN
delays
Routing
composability
IP networks
privacy
Resiliency
resilience
collaboration
policy-based governance
pubcrawl
Peer-to-peer computing
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 1:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 10:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
biblio
Using advanced detection and prevention technique to mitigate threats in SDN architecture
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
SDN architecture
services deployment
SDN threats
OpenFlow KPG-MT
MITM
man in the middle attacks
malware-based attacks
KPG-MT
DoS/DDoS
distributed SDN
centralized network abstraction
DDoS Attack Prevention
centralized architecture
security devices
Denial of Service attacks
Software Defined Networks
Computer crime
malwares
SDN
authentication
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer architecture
invasive software
performance evaluation
malware
computer network security
biblio
Network Security Monitoring (NSM): Can it be Effective in a World with Encrypted Traffic?
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Scalability
Resiliency
pubcrawl
MITM
HTTPs
Network Security Monitoring
SNI
SSL/TLS
Security by Default
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks
Submitted by grigby1 on Wed, 05/09/2018 - 1:49pm
Compositionality
Human behavior
ICs
MITM
oT
pubcrawl
Reconnaissance
resilience
Resiliency
SCADA
SCADA systems
security
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
1
2
next ›
last »