Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack
biblio
Abnormal Bus Data Detection of Intelligent and Connected Vehicle Based on Neural Network
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
Floods
Intelligent Data and Security
Intelligent Data Security
optimized neural network
Intelligent vehicles
abnormal bus data detection
abnormal bus data analysis
abnormal bus data
data centers
connected vehicles
Intelligent Transportation Systems
attack
Compositionality
Automotive engineering
Logic gates
neural network
data analysis
Vulnerability
neural nets
standards
detection
pubcrawl
Resiliency
Scalability
intrusion detection system
security of data
biblio
A Reputation Management Framework for MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
pubcrawl
trusted mobile ad hoc networks
Trusted Computing
trust information
security of data
Resiliency
resilience
reputation system
reputation management system
attack
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs
manet privacy
malicious information
malicious attacks
Compositionality
biblio
Accurate Marking Method of Network Attacking Information Based on Big Data Analysis
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
resilience
network attack detection ability
network attack information nodes
network attack nodes
network attacking information
network offensive information
network security defense
open network environment
pubcrawl
Network
Resiliency
Scalability
security of data
smart cities
task scheduling method
telecommunication scheduling
Transportation
big data security in the cloud
accurate marking method
adaptive learning model
attack
attack information chain
attack information tagging
Big Data
Big Data analysis method
Big Data fusion tracking recognition
Chained Attacks
Cloud Computing
computer network security
Conferences
data analysis
information marking
learning (artificial intelligence)
Metrics
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
DDOS Defense Strategy in Software Definition Networks
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
DDoS
victim defense strategy
ubiquitous situation
software definition network
Software Definition
social life
network society
network economy
military life
distributed defense strategy
distributed defense strategies
defense strategy
DDOS defense strategy
DDoS Attack
cultural life
DDoS Attack Prevention
Computer crime
denial-of-service attack
intermediate network
computer viruses
attack
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
network security
software defined networking
IP networks
computer network security
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
Security on Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
attack
composability
Human behavior
low-cost sensor nodes
Metrics
placement algorithm
pubcrawl
Resiliency
security
sensor placement
sensor security
telecommunication network routing
telecommunication security
Wireless Sensor Network
wireless sensor network security
wireless sensor networks
file
Trusted CPS from Untrusted Components
Submitted by bmcmillin on Fri, 01/10/2020 - 4:38pm. Contributors:
Bruce Mcmillin
Jonathan Kimball
Rui Bo
Jennifer Leopold
Invariant
Data mining
Port Hamiltonian
attack
Infrastructure
Posters
1837472
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Cross-Site Scripting for Graphic Data: Vulnerabilities and Prevention
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
Scalability
XSS vulnerabilities
XSS attacks
XSS
XML treatment method
XML
white list.
websites
Web sites
Vulnerability
testing
TES
SVG image
SVG
security of data
Cross Site Scripting
resilience
pubcrawl
malware
Human behavior
graphical content
graphic content
cross-site scripting
Computer graphics
code
Cascading style sheets
black list
attack
animation
Resiliency
biblio
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
malware
XSS
Web users
Web sites
Web server
Web response
Web request
Web based application vulnerabilities
Uniform resource locators
secure development life cycle practices
Scalability
resilience
pubcrawl
online front-ends
nonpersistent cross-site scripting attack
non-persistent
attack
malicious links
malicious functions
Libraries
legitimate Web site
Internet based application
internet
Human behavior
encoding
cross-site scripting
Cross Site Scripting
clients Web browser
client-side code injection attack
Browsers
attack surface
« first
‹ previous
1
2
3
4
5
next ›
last »