Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Diagnostics
biblio
Anomalies Detection of Routers Based on Multiple Information Learning
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
privacy
telecommunication network routing
Syslogs
security of data
security
routers
Router Systems Security
router system
router syslogs
router security
router anomalies detection
Resiliency
resilience
pubcrawl
Anomaly Detection
multiple information learning
Metrics
learning (artificial intelligence)
learning
internet
input routers
feature extraction
Diagnostics
Correlation
computer network security
Computer bugs
communication devices
biblio
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification
Submitted by aekwall on Mon, 06/10/2019 - 9:15am
routing procedure
multiple malicious nodes
passive attacks
privacy
pubcrawl
reasoning rules
Resiliency
Routing
routing phases
mobile computing
routing security
security
Syslog
telecommunication network routing
telecommunication security
verification
verification phase
active attacks
mobile ad hoc networks
Metrics
Merkle hash tree
MANETs routing
MANETs
MANET Attack Detection
log-based anomalies detection
flow graphs
flow graph
Diagnostics
composability
cognition
central control program
Anomaly Detection
Ad hoc networks
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
Detecting and thwarting hardware trojan attacks in cyber-physical systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:00am
thwarting hardware trojan attacks
Resiliency
security
security measures
smart grid application
Software component
software security
software-only attack
supervisory module
third-party soft IP cores
Reliability
Trojan horses
trust
trust enhancements
trust metric
trust specifications
Trusted Computing
trusted platform modules
verification
Hardware
composability
counter-measure
cyber-physical system integrity
cyber-physical systems
design
Diagnostics
Embedded System
field programmable gate arrays
attack vector models
hardware component
hardware security platform
hardware-only attack
invasive software
IP networks
isolated security primitives
Measurement
pubcrawl
profile
Gautam Biswas
CPS Domains
Aerospace
Automotive
Transportation Systems Sector
Energy Efficient Buildings
Consumer
Avionics
Space Systems
Defense
Control
Energy
Modeling
Critical Infrastructure
Transportation
Simulation
CPS Technologies
Education
Aircraft
Data Driven Analytics
Diagnostics
fault tolerance
modeling
NextGen
Prognostics
simulation
spacecraft
Tennessee