Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
spoofing detection
biblio
Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection
Submitted by grigby1 on Fri, 02/03/2023 - 3:37pm
pubcrawl
Metrics
resilience
Resiliency
Conferences
authentication
Industrial Communication
Communication system security
composability
delays
wireless networks
physical layer security
spoofing detection
USRP
industrial wireless network
PHY layer security
biblio
Spoofing Detection for Indoor Visible Light Systems with Redundant Orthogonal Encoding
Submitted by aekwall on Tue, 05/10/2022 - 1:45pm
denial of service
Visible Light Communications Security
spoofing detection
orthogonal encoding
multi-link VLC
indoor VLC and VLS
Fixtures
Transmitters
light emitting diodes
sensors
encoding
Resiliency
Metrics
Scalability
pubcrawl
Conferences
Hardware
biblio
Implementation of Two Factor Authentication based on RFID and Face Recognition using LBP Algorithm on Access Control System
Submitted by grigby1 on Thu, 07/08/2021 - 3:38pm
Access Control
authentication
face recognition
Histograms
Human behavior
Human Factors
LBP
photo attack
process control
Prototypes
pubcrawl
radiofrequency identification
RFID
security
spoofing detection
two factor authentication
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
dynamic wireless communication
dynamic networks
upper layer authentication
upper layer assisted method
static communications
spoofing detection
PLA models
physical layer authentication mechanisms
physical layer authentication
performance stability
network environments
lightweight cross-layer authentication scheme
hypothesis test models
fast cross layer authentication scheme
dynamic wireless network
pubcrawl
dynamic communication scenarios
cross layer authentication
authentication delay
mobile radio
wireless channels
computational complexity
radio networks
composability
Cryptographic Protocols
telecommunication security
message authentication
Resiliency
resilience
Metrics
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication
biblio
Multiple Attributes Based Spoofing Detection Using an Improved Clustering Algorithm in Mobile Edge Network
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
MEC network
spoofing detection method
spoofing detection
security problems
security of data
Scalability
Resiliency
pubcrawl
pattern clustering
multiple channel attributes
multiple attributes
mobile edge computing network
Mobile Edge Computing
mobile computing
Cloud Computing
Intrusion Detection
internet
Information Centric Networks
Information Centric Network
Image edge detection
ICN
Heuristic algorithms
edge computing
distributed network architecture
Clustering algorithms
clustering algorithm
cluster algorithm
cloud platform
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
biblio
Spoofing detection via simultaneous verification of audio-visual synchronicity and transcription
Submitted by grigby1 on Mon, 12/10/2018 - 11:37am
multimodal biometrics
visualization
Training
text-dependent spoofing detection
Streaming media
spoofing detection
spoofing attacks
Speech recognition
speaker recognition
security of data
Scalability
Resiliency
resilience
replayed synthesized utterances
pubcrawl
acoustic coupling
liveness detection
Human behavior
Hidden Markov models
feature extraction
data synchronicity
cyber-physical systems
coupled hidden Markov models
bimodal replay attack
audio-visual systems
audio-visual synchronicity
audio-visual speaker recognition
acoustic speaker recognition systems
Acoustic signal processing
biblio
Protecting DNS Services from IP Spoofing: SDN Collaborative Authentication Approach
Submitted by grigby1 on Tue, 10/03/2017 - 11:47am
authentication
botnets
DNS flooding attack
Human behavior
Metrics
network security
OpenFlow
pubcrawl
Resiliency
Scalability
SDN
spoofing detection