Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
man in the middle attack
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
Name-Signature Lookup System: A Security Enhancement to Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:34pm
ip privacy
Hardware
Human behavior
man in the middle attack
named data networking
Network Interface Controller
privacy
Protocols
pubcrawl
resilience
Resiliency
Robustness
Scalability
security
Servers
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
IKE protocol
word length 128 bit
Synchronization
security association attack
securing communications
SA
Protocols
network protocol
network communication domain
man in the middle attack
keys phase exchange
IPSec protocol
IPsec
Internet key exchange protocol
internet
chaotic cryptography
IKE
FPGA implementation
FPGA
field programmable gate arrays
DH-HEMTs
data phase transfer
Cryptography
Cryptographic Protocols
computer network security
chaotic cryptosystem solution
chaotic cryptosystem
chaotic communication
4-dimension chaotic system
pubcrawl
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
Internet key exchange protocol
IPsec
4-dimension chaotic system
chaotic cryptosystem
chaotic cryptosystem solution
data phase transfer
FPGA implementation
IKE
IKE protocol
securing communications
keys phase exchange
man in the middle attack
network communication domain
network protocol
SA
security association attack
word length 128 bit
computer network security
IPSec protocol
chaotic cryptography
chaotic communication
Predictive Metrics
DH-HEMTs
internet
Cryptography
Synchronization
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
FPGA
field programmable gate arrays
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps