Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack
biblio
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet
Submitted by grigby1 on Tue, 09/05/2017 - 12:50pm
attack
composability
digital signal processing
eavesdropping
Ethernet
FPGA
Metrics
privacy
pubcrawl
Resiliency
signal processing
signal processing security
tempest
biblio
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks
Submitted by grigby1 on Tue, 09/05/2017 - 12:43pm
attack
composability
defense
IMs
LTE
Metrics
mobile networks
network accountability
pubcrawl
Resiliency
SMS
spam detection
threat mitigation
biblio
Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic
Submitted by grigby1 on Mon, 06/05/2017 - 11:33am
artificial intelligence security
attack
behavioral fingerprints
clustering
composability
Human behavior
k-means
Metrics
privacy
pubcrawl
Resiliency
biblio
A One-Way Proof-of-Work Protocol to Protect Controllers in Software-Defined Networks
Submitted by grigby1 on Mon, 04/03/2017 - 10:54am
attack
composability
defense
Denial-of-Service
internet
Metrics
network control systems
network control systems security
networked control systems
pubcrawl
Resiliency
security
biblio
The Smaller, the Shrewder: A Simple Malicious Application Can Kill an Entire SDN Environment
Submitted by grigby1 on Mon, 04/03/2017 - 10:54am
attack
composability
Metrics
network control systems
network control systems security
networked control systems
pubcrawl
Resiliency
security
software-defined networking
biblio
Hash based efficient secure routing for network communication
Submitted by BrandonB on Wed, 05/06/2015 - 7:55am
mobile computing
WLAN
telecommunication security
security
Routing protocols
Routing Protocol
Routing
power backup
packet transfer
networking
network communication
Mobility
Ad hoc networks
Mobile communication
mobile ad-hoc networks
Mobile Ad-hoc
mobile ad hoc networks
infrastructure wireless networks
hash based efficient secure routing
energy problem
Cryptographic Protocols
autonomous network
authentication
attack
biblio
Moving-Target Defenses for Computer Networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:15am
attack
Complexity theory
Computer crime
computer network protection
computer network security
computer security
Cyberspace
moving-target defense
moving-target defenses
MTD
network security
security approach
static target
system security
target
target tracking
biblio
A game-theory analysis of the rat-group attack in smart grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:40am
Analytical models
attack
Companies
electricity
game theory
game-theory analysis
Games
power engineering computing
Power Grid
rat-group attack
security of data
Smart Grid
Smart Grids
smart meter
smart meters
smart power grids
file
Session V: Cyber-Physical Security and Privacy - Breakout Session II: Defense Strategies and Mechanisms
Submitted by Felix Wu on Wed, 01/29/2014 - 4:50pm. Contributors:
S. Felix Wu
Stéphane Lafortune
CPS Domains
Automotive
Resilient Systems
Transportation
CPS Technologies
Foundations
attack
challenges
research problems
Resiliency
Transportation
Breakout Session 2
Breakout Session 2
2014 National Workshop on Transportation CPS
2014
Academia
file
Securing the Router Infrastructure of the Internet
Submitted by Katie Dey on Wed, 10/31/2012 - 11:02am. Contributors:
Tilman Wolf
Russell Tessier
ABSTRACT
SaTC Posters
attack
computer network
embedded system security
University of Massachusetts Amherst
1115999
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
1
2
3
4
5