Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack scenarios
biblio
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin
temporal spatio-temporal
spatial spatio-temporal
peer-to-peer transactions
partitioning
network dynamics
network distribution
logical partitioning attacks
decentralized network architecture
Bitcoin network
attack scenarios
bitcoin security
security of data
Distributed databases
Software
Human behavior
pubcrawl
Peer-to-peer computing
Organizations
blockchain
internet
Scalability
IP networks
biblio
Identification of Critical-Attacks Set in an Attack-Graph
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
Industrial Control Systems
water treatment cyber-physical system
water treatment
system-level security property
system vulnerabilities
strongly-connected-components
security administrators
SCC
Min Label-Cut
critical-attacks set
complex attacks scenarios
attack-paths
attack-graph
advanced multifaceted attacks
attack graphs
attack scenarios
security of data
attack graph
Predictive Metrics
security measurements
control engineering computing
industrial control
system security
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
security
Internet of Things
biblio
Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units
Submitted by aekwall on Mon, 07/20/2020 - 10:42am
Intelligent Transportation Systems
Vehicular security
Plugs
low cost CAN probe
electronic control units
defined analysis tools
controller area networks
car generation
CAN bus attacks
Brakes
autonomous vehicles
automotive control area network bus
attack scenarios
connected vehicles
automobiles
automotive electronics
controller area network security
Payloads
Engines
Probes
security protocols
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
An empirical study of intelligent approaches to DDoS detection in large scale networks
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
intensity
attack scenarios
class imbalance problem
comprehensive empirical evaluation
DDoS detection
distributed denial-of-services attacks
empirical evaluation
frequency
intelligent approaches
alarming rate
large scale networks
machine learning based DDoS detection techniques
machine learning techniques
ML-based DDoS detection capabilities
ML-based detection techniques
Performance Metrics
DDoS attack detection
Computer crime
denial-of-service attack
Sensitivity
empirical study
Benchmark testing
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
Monitoring
computer network security
biblio
Peace Through Superior Puzzling: An Asymmetric Sybil Defense
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
distributed computing
Sybil participants
Sybil defense algorithm
sybil attacks
Sybil attack
spending rate
Resiliency
resilience
pubcrawl
Metrics
abstract-A common tool
computer network security
computational puzzles
computational complexity
composability
attacker
attack scenarios
asymmetric Sybil defense
Algorithm design and analysis
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience