Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cross Layer Security
biblio
Voice Recognition Based Security System Using Convolutional Neural Network
Submitted by grigby1 on Wed, 03/09/2022 - 12:41pm
Metrics
STT (Speech-to-Text)
statistical analysis
Speech recognition
speech coding
security
Resiliency
resilience
pubcrawl
multifactor authentication
MFCC (Mel-Frequency Cepstrum Coefficients)
composability
internet
Human Factors
Human behavior
GUI (Graphic User Interface)
convolutional neural networks
convolution
CNN (Convolutional Neural Network)
ASR (Artificial Speech Recognition)
ANN (Artificial Neural Network)
Cross Layer Security
biblio
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples
Submitted by grigby1 on Tue, 05/25/2021 - 1:21pm
Cross Layer Security
composability
pubcrawl
resilience
Resiliency
biblio
Cross-Layer Profiling of Encrypted Network Data for Anomaly Detection
Submitted by grigby1 on Tue, 05/25/2021 - 1:21pm
Cross Layer Security
Anomaly Detection
composability
deep learning
encrypted communications
encryption
feature extraction
IP networks
machine learning.
network data analysis
Protocols
pubcrawl
resilience
Resiliency
Routing protocols
biblio
A Multi-layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application
Submitted by grigby1 on Tue, 05/25/2021 - 1:20pm
Organizations
wireless sensor networks
taxonomy
Steel
security
SCADA
Resiliency
resilience
pubcrawl
Cross Layer Security
Multi layer Taxonomy
Industrial Internet of Things
Industrial Control Systems
iiot
composability
Complexity theory
attack
biblio
Improving Cellular IoT Security with Identity Federation and Anomaly Detection
Submitted by grigby1 on Tue, 05/25/2021 - 1:20pm
Cross Layer Security
Adaptation models
Anomaly Detection
Clustering algorithms
composability
Data models
IoT security
machine learning
mobile network security
Partitioning algorithms
pubcrawl
resilience
Resiliency
security
biblio
A Built-in Hash Permutation Assisted Cross-layer Secure Transport in End-to-End FlexE over WDM Networks
Submitted by grigby1 on Tue, 05/25/2021 - 1:20pm
Cross Layer Security
attack and defense model
composability
encryption
FlexE over WDM network
Hash mapping
network security
Optical fiber amplifiers
Optical fiber cables
Optical fiber couplers
Optical fiber devices
Optical fiber networks
pubcrawl
resilience
Resiliency
security
biblio
Security-driven Cross-Layer Model Description of a HW/SW Framework for AP MPSoC-based Computing Device
Submitted by grigby1 on Tue, 05/25/2021 - 1:19pm
estimation
standards
security
Resiliency
resilience
pubcrawl
optimization
HW/SW Framework
Hardware
Cross Layer Security
cross-layer
computing device
Computational modeling
composability
automation
attacks
AP MPSoC-based ECU
Adaptation models
biblio
Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks
Submitted by grigby1 on Tue, 05/25/2021 - 1:19pm
Cross Layer Security
black-hole attack
composability
Cross-layer routing
gray-hole attack
MAC attacks
pubcrawl
resilience
Resiliency
security
VANET
biblio
Demo Abstract: Cross-layer Authentication Based on Physical Channel Information using OpenAirInterface
Submitted by grigby1 on Tue, 05/25/2021 - 1:19pm
Cross Layer Security
authentication
Communication system security
composability
cross-layer authentication mechanism
fingerprint map
Fingerprint recognition
Long Term Evolution
OAI
pubcrawl
resilience
Resiliency
Training
Wireless communication
biblio
Robust Cross-Layer Security Framework For Internet of Things Enabled Wireless Sensor Networks
Submitted by grigby1 on Tue, 05/25/2021 - 1:18pm
man-in-middle attack
wireless sensor networks
security
Robustness
Resiliency
resilience
pubcrawl
Physical layer
Monitoring
Cross Layer Security
Internet of Things
Energy Efficiency
cross-layer technique
composability
Clustering algorithms
clustering
attacker
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »