Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security
biblio
HoneyBog: A Hybrid Webshell Honeypot Framework against Command Injection
Submitted by grigby1 on Fri, 08/12/2022 - 4:34pm
Bidirectional control
command injection attacks
pubcrawl
composability
Resiliency
Metrics
command injection
computer architecture
Computers
Conferences
Hybrid Honeypot
network security
PHP
Prototypes
Web servers
Webshell
biblio
Autonomous Application in Requirements Analysis of Information System Development for Producing a Design Model
Submitted by grigby1 on Fri, 08/12/2022 - 2:25pm
Complexity theory
Swarm Intelligence
dynamic
telecommunication computing
key management
convolution neural network
Computing Theory
trust
Technological innovation
Trusted Computing
Organizations
network security
programming
composability
Safety
Resiliency
resilience
Human behavior
pubcrawl
biblio
Applied Cryptography in Network Systems Security for Cyberattack Prevention
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Applied cryptography
Cryptography
encryption
fabrication
Hash functions
Interception
Interruption
modification
network security
pubcrawl
Public key
resilience
Resiliency
RSA
Trustworthy Systems
Virtual private networks
biblio
Vibe: An Implicit Two-Factor Authentication using Vibration Signals
Submitted by grigby1 on Mon, 08/01/2022 - 2:45pm
pubcrawl
Human behavior
Human Factors
Hardware
performance evaluation
authentication
network security
Error analysis
Physical layer
web security
Vibrations
physical-layer security
two factor authentication
Continuous Authentication
vibration
zero-effort two-factor authentication
biblio
Methods of Detecting and Neutralizing Potential DHCP Rogue Servers
Submitted by grigby1 on Fri, 07/29/2022 - 5:13pm
tools
Servers
IP networks
pubcrawl
resilience
Resiliency
Routing
network security
computer security
computer networks
operating systems
testing
Operating systems security
DHCP rogue servers
DHCP servers
GNU/Linux operating systems
biblio
Recommendation Method of Honeynet Trapping Component Based on LSTM
Submitted by grigby1 on Fri, 07/15/2022 - 12:59pm
data privacy
Pervasive Computing Security
honeynet
Hacker's interests
attention mechanism
LSTM
Bridges
Metrics
network security
Big Data
Computer hacking
Scalability
Analytical models
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Predictive models
biblio
Information Protection of International Students Based on Network Security
Submitted by grigby1 on Wed, 07/13/2022 - 1:16pm
International Students in China
security management
Scalability
Resiliency
resilience
pubcrawl
process control
policy governance
network security
Metrics
collaboration
information security
information protection
Human behavior
education
data privacy
cybersecurity education
cyber security
composability
Companies
biblio
Layered Security Multicast Algorithm based on Security Energy Efficiency Maximization in SCMA Networks
Submitted by aekwall on Fri, 07/01/2022 - 9:49am
codes
SCMA
OFDM
networks security energy efficiency
Multicast algorithms
layered security multicast
codebook assignment
channel coding
power allocation
simulation
Energy Efficiency
resource management
network security
composability
Resiliency
Metrics
pubcrawl
biblio
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking
Submitted by grigby1 on Wed, 06/15/2022 - 10:57am
Anomaly Detection
Peer-to-peer computing
pubcrawl
Human behavior
Conferences
Scalability
network security
bitcoin
cryptocurrency
P2P network
Connection Manipulation
eclipse
bitcoin security
biblio
Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection
Submitted by grigby1 on Tue, 06/14/2022 - 1:12pm
Training
feature extraction
machine learning
pubcrawl
resilience
Resiliency
Conferences
Scalability
Big Data
network security
Perturbation methods
Measurement
big data security metrics
network intrusion detection
adversarial artificial intelligence
model robustness evaluation
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »