Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT devices
biblio
Agent Based Fog Architecture using NDN and Trust Management for IoT
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
robust system
IoT generation
multi-agent systems
Named Data Network Security
Named Data Network(NDN)
NDN
present-day network infrastructure
pubcrawl
resilience
Resiliency
IoT devices
Scalability
secured named data network protocol
secured system
security
Servers
service-oriented architecture
traffic usage reduction
Trust management
drastic rate
agent based composition model
agent society
caching layer
Cloud Computing
Computational modeling
computer architecture
computer network security
Data models
Agent Based Communication
edge computing
fog architecture
fog based agent model
Fog computing
fog layer
Human behavior
Internet of Things
Internet of Things (IoT)
biblio
Deep Learning-Based Intrusion Detection for IoT Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
pubcrawl
IoT devices
IoT network
learning (artificial intelligence)
multiclass classification
Network reconnaissance
packet level
pattern classification
Power Grid
IoT dataset
reconnaissance attacks
resilience
Resiliency
Scalability
security controls
telecommunication traffic
Traffic flow
feed-forward neural networks model
communication infrastructure
computer network security
computing infrastructure
deep learning-based intrusion detection
defence networks
Denial of Service attacks
distributed denial of service
Feed Forward Neural Networks
binary classification
feedforward neural nets
field information
healthcare automation
information theft attacks
Internet of Thing
Internet of Things
Intrusion Detection
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
biblio
An abstraction layer for cybersecurity context
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
Metrics
virtual services
telecommunication security
software components
security-related data
security of data
security context
security appliances
Resiliency
resilience
pubcrawl
object-oriented programming
object oriented security
cloud applications
lightweight inspection
IoT devices
Internet of Things
heterogeneous sources
flexible abstraction layer
enforcement hooks
cybersecurity context
cyber-security frameworks
cyber-attacks
composability
Cloud Computing
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
biblio
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
physical layer security
wireless communication protocols
typical cryptography
radiocommunication
PLS
Internet of Things applications
initial performance analysis
Force
computational power
classical cryptography
IoT devices
IoT
Ciphers
resilience
Resiliency
Metrics
composability
pubcrawl
Receivers
Protocols
Internet of Things
encryption
Cryptography
biblio
Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
SSL
security concerns
secured web service
Response code
QR code based approach
lightweight security algorithm
hard-coded credentials related attacks
Hard-coded credentials
GUI
clear text log-in id
password
IoT manufacturers
computer network security
QR code
cyber physical systems
web services
pubcrawl
Resiliency
invasive software
IoT devices
Internet of Things
Cryptography
authorisation
DDoS
biblio
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
sandboxing
mitigation method
MicroGuard
microcontrollers
Internet of Things devices
Data protection
component-level sandboxing
bare-metal microcontrollers
bare-metal micro controllers
automated code randomization
Internet of Things
source code (software)
code randomization
code-reuse attacks
composability
IoT devices
policy-based governance
pubcrawl
collaboration
security of data
biblio
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Submitted by aekwall on Mon, 03/23/2020 - 1:21pm
PUF
random key generation
SRAM PUF
SRAM device
SRAM chips
SRAM chip
SRAM
PUF key generation mechanism
Private keys
fuzzy extractors
fuzzy extractor techniques
error correction coding methods
Error analysis
Arduino mega shield
adjustable memory-based PUF
key generation
IoT
error correction codes
physically unclonable functions
Random access memory
authentication
Metrics
pubcrawl
Human behavior
Resiliency
secret keys
private key cryptography
IoT devices
Internet of Things
encryption
Servers
Scalability
biblio
Scalable QAM Modulation for Physical Layer Security of Wireless Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:33am
wireless networks
Scalable Security
wireless channel
scalable quadrature modulation
scalable QAM
quadrature amplitude modulation
QAM modulation
OFDM
Internet of Things concept
FFT
connected devices
cryptographic algorithms
IoT
wireless channels
Scalability
energy consumption
physical layer security
Data protection
pubcrawl
IoT applications
IoT devices
Internet of Things
computer network security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »