Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless fidelity
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
pubcrawl
ZigBee packets
Zigbee
wireless sensor networks
wireless networks
wireless LAN
Wireless fidelity
Wi-Fi devices
telecommunication security
spoofing attack detection
RSSI
RSS
Resiliency
resilience
received signal strength
authentication mechanism
physical layer information
Physical layer
packet radio networks
ISM band
heterogeneous wireless networks
heterogeneous wireless devices
frequency 2.4 GHz
CTC schemes
cross-technology communication
Cross Layer Security
composability
Communication system security
collaborative mechanism
biblio
Automatic stabilization of Zigbee network
Submitted by aekwall on Mon, 08/05/2019 - 10:37am
Resiliency
ZigBee sub-device
ZigBee signal strength
ZigBee relay
Zigbee network
ZigBee gateway
ZigBee coordinator
Zigbee
Wireless fidelity
Wireless communication
stable ZigBee transmission
Smart homes
Smart Home
automatic stabilization
pubcrawl
power consumption
original ZigBee node
low power consumption
Logic gates
IoT
internetworking
intelligent system
information technology
expandability
computer science
composability
biblio
Wireless Security Audit Penetration Test Using Raspberry Pi
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
Scalability
wireless technology
wireless security audit
Wireless Protected Access
wireless networks
wireless LAN
Wireless fidelity
Wired Equivalent Privacy
WiFi testing tools
WiFi network
WiFi Auditor
WiFi attacks
tools
telecommunication security
Security Audits
auditing
Resiliency
resilience
Raspberry Pi 3 module
pubcrawl
Penetration Testing
penetration tester
man in the middle
Jamming
Human Factors
Human behavior
deliberate jamming
Communication system security
authorized wireless communications
authorisation
biblio
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection
Submitted by grigby1 on Fri, 03/15/2019 - 11:53am
pubcrawl
wireless LAN
wireless Internet environment
wireless integrated environment
Wireless fidelity
Wireless communication
wireless AP security
Wi-Fi
unauthorized AP
unauthorized Access Point detection
threat vectors
Support vector machines
support vector machine
security
RTT value data
Classification algorithms
protection
privacy
Prediction algorithms
multilayer perceptrons
military facilities
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
information protection
hacking attacks
detection
computer network security
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
Security throwbot
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
composability
Wireless fidelity
Wireless Connectivity
sensors
security throwbot
security issues
security
Accelerometers
actuators
Bluetooth
bluetooth security
Cameras
Resiliency
control engineering computing
Human behavior
human computer interaction
human factor
human-to-computer interaction
Internet of Things
mobile robots
pubcrawl
resilience
IoT
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
RoFi: Rotation-aware WiFi Channel Feedback
Submitted by el_wehby on Fri, 05/25/2018 - 3:46pm
Games
MIMO
Mobile communication
Signal to noise ratio
Throughput
Wireless communication
Wireless fidelity
1536086
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges
« first
‹ previous
1
2
3
4
5
6
next ›
last »