Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
emulation
biblio
IFFSET: In-Field Fuzzing of Industrial Control Systems using System Emulation
Submitted by grigby1 on Tue, 08/17/2021 - 3:57pm
composability
Computer crashes
emulation
fuzzing
industrial control
integrated circuits
Kernel
Linux operating system
Linux Operating System Security
Metrics
performance evaluation
pubcrawl
resilience
Resiliency
security
biblio
Semi-Fast Byzantine-tolerant Shared Register without Reliable Broadcast
Submitted by grigby1 on Wed, 05/05/2021 - 12:43pm
Registers
Task Analysis
Servers
Safety
Safe registers
Safe Coding
Resiliency
resilience
Reliable broadcast
reliability theory
byzantine faults
pubcrawl
policy-based governance
Metrics
MDS codes
Human Factors
Human behavior
encoding
emulation
collaboration
biblio
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Adversary Emulation
Adversary Models
cyber-physical security
cyber-physical systems
emulation
Human behavior
hybrid attack graph
Metrics
Numerical models
pubcrawl
Reinforcement learning
resilience
Resiliency
Scalability
security
uncertainty
biblio
Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
Cognitive radio (CR) network
Cognitive Radio Security
yardstick based threshold allocation technique
Yardstick based Threshold Allocation (YTA)
X-graph
unlicensed secondary users
spectrum sensing
spectrum scarcity problem
spectrum access probability
Secondary User (SUs)
Primary User Emulation Attack (PUEA)
Primary User (PU)
ns2
free spectrum
dynamic cognitive radio networks
pubcrawl
radiofrequency interference
primary user emulation attack
emulation
licensed primary user
radio spectrum management
cognitive radio
STEM
resource management
sensors
estimation
Analytical models
telecommunication security
Resiliency
resilience
biblio
Consistent Offline Update of Suspended Virtual Machines in Clouds
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
security updates
cloud administrators
Cloud Computing
clouds
consistent offline update
emulation
infrastructure-as-a-service clouds
internet
OUassister
pubcrawl
security
security of data
VMs online
suspended virtual machines
suspended VMs
Task Analysis
tools
users
virtual disks
virtual machine security
virtual machines
Virtual machining
VM introspection
VMs offline
biblio
Mitigating Physical Layer Attack in Cognitive Radio - A New Approach
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pubcrawl
Zadoff-Chu sequence
wireless channels
telecommunication security
spectrum sensing
sensors
Resiliency
resilience
replay attack
radio spectrum management
radio frequency spectrum
PUEA
authentication
primary user emulation attack
physical layer attack mitigation
Physical layer
OFDM
emulation
distance calculation
Correlation
Communication channels
Cognitive Radio Security
cognitive radio
biblio
Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pregenerated hash digest
telecommunication security
sensors
Resiliency
resilience
radio networks
PUEA
pubcrawl
primary user emulation attack
primary user authentication
authentication
node authentication
emulation
Cryptography
CRN
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
Base stations
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless channels
Transmitters
telecommunication security
Signal to noise ratio
RSS-based localization method
RSS-based localization
Resiliency
resilience
Receivers
radiofrequency interference
radio spectrum management
PUE attacker detection
cognitive radio
primary user signals
primary user emulation attacker
primary user emulation attack
mobile users
mobile radio
maximum likelihood estimation
Mathematical model
licensed users
emulation
cognitive radio technology
Cognitive Radio Security
cognitive radio networks
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
« first
‹ previous
1
2
3
next ›
last »