Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reliability
biblio
Digital Forensics: Maintaining Chain of Custody Using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Human behavior
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
participants
Metrics
legislation
Law
information forensics
hyperledger composer
Human Factors
assets
encryption
distributed ledger
Distributed databases
Digital Forensics
digital evidence
Cybercrime
Cryptography
Conferences
Computer crime
chain of custody maintenance
chain of custody
blockchain
Base64
biblio
Secure Route Selection Mechanism in the Presence of Black Hole Attack with AOMDV Routing Algorithm
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Blackhole attack
trusted network
terminal node
single attack
sensitive field
secure route selection mechanism
police rescue operation
origin node
collaborative attack
Black hole attack
AOMDV routing algorithm
AOMDV
adversarial network setting
security mechanism
IP networks
mobile ad hoc networks
MANET
collaboration
mobile radio
Reliability
Routing
Routing protocols
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
Modeling and Analysis of CPS Availability Based on the Object-oriented Timed Petri Nets
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented
simulations
security-critical applications
Resiliency
resilience
Reliability
pubcrawl
Petri nets
Petri Net
object-oriented timed Petri net
object-oriented system
object-oriented methods
Availability analysis
object oriented security
Metrics
mathematical analysis method
mathematical analysis
cyber-physical systems
CPS modeling
CPS availability analysis
CPS architecture model
CPS
composability
biblio
Analyzing the Browser Security Warnings on HTTPS Errors
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
Error analysis
Resistance
browser behaviors
browser defects
browser security warnings
certificate verification
certification
common HTTPS errors
cryptographic algorithm
Compositionality
HPKP
HSTS
name validation
Phase change materials
secure connections
secure Web applications
valid certificate chain
Web Browser Security
internet
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data confidentiality
telecommunication security
data privacy
Cryptography
composability
encoding
programming
online front-ends
error correction codes
Metrics
Reliability
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
omnidirectional antenna
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
full-duplex manner
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
resilience
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
Internet of Things
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
biblio
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
witness functions
Waste materials
telecommunication security
security vulnerability
security of data
security
Reliability
pubcrawl
protocol verification
collaboration
policy-based governance
Policy Based Governance
Needham-Schroeder symmetric-key protocol
formal verification
encryption
Cryptographic Protocols
Compositionality
composability
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »