Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Telecommunications
biblio
A DNS Security Policy for Timely Detection of Malicious Modification on Webpages
Submitted by grigby1 on Mon, 01/31/2022 - 4:39pm
Browsers
web defacement
malicious modification
malicious browser extensions
websites
Telecommunications
Web Browser Security
Web pages
Phishing
Compositionality
security
domain name system
security policies
DNS
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A Study of Network Security Situational Awareness in Internet of Things
Submitted by aekwall on Mon, 11/29/2021 - 1:10pm
Internet of Things
Computer crime
network security
pubcrawl
Resiliency
composability
Communication networks
DDoS
Telecommunications
Predictive Metrics
botnet
situational awareness
security situation awareness
biblio
Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks
Submitted by aekwall on Tue, 08/17/2021 - 3:15pm
security
Resists
authentication
Scalability
pubcrawl
Metrics
Resiliency
Human behavior
Ad hoc networks
Airborne ad hoc networks
Forgery
forgery attack
identity-based
key management
Optics
Telecommunications
biblio
TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing
Submitted by grigby1 on Thu, 07/08/2021 - 2:51pm
smart phones
Voiceprint recognition
voice-print
voice
two factor authentication
Telecommunications
Speech recognition
Spectrogram
speaker recognition
authentication
security
pubcrawl
MFCC
identity authentication
Human Factors
Human behavior
GMM-UBM
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 10:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
Detection and Prevention of Black Hole Attack in SUPERMAN
Submitted by aekwall on Tue, 03/09/2021 - 11:39am
manet attack prevention
Ad hoc networks
Black hole attacks
MANET Attack Detection
mobile computing
pubcrawl
Resiliency
Routing
Routing protocols
Scalability
security
Telecommunications
wireless networks
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
« first
‹ previous
1
2
3
4
5
6
next ›
last »