Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 2:44pm
parametric signal modeling
ECU fingerprinting
eight-channel lengths
electronic control unit (ECU)
feature-set
Image edge detection
in-vehicle control networks
in-vehicle security
Intrusion Detection System (IDS)
lumped element model
Lumped element model (LEM)
machine learning (ML)
modern electric vehicles
on-board communications
data theft
performance matrix (PM)
Physical layer
received signal
receiver operating characteristic (ROC)
spoofing attacks
traditional cybersecurity methods
Transfer functions
transmitted messages
transmitter
Transmitters
transmitting electronic control unit
unique transfer function
Neural Network Security
artificial neural network (ANN)
pubcrawl
policy-based governance
collaboration
computer network security
message authentication
telecommunication security
Cryptographic Protocols
Protocols
neural nets
Metrics
confidentiality
neural network
Artificial Neural Networks
Neural networks
autonomous vehicles
basic security features
CAN messages
CAN network
channel imperfections
channel-specific step response
communication system
Connected autonomous vehicles
control system parameters
Controller area network (CAN)
controller area network protocol
controller area networks
biblio
Securing GOOSE: The Return of One-Time Pads
Submitted by grigby1 on Fri, 05/08/2020 - 2:21pm
smart grid security
Protocols
pubcrawl
real-time communications
resilience
Resiliency
Secure GOOSE
securing GOOSE
security recommendations
power engineering computing
Smart Grids
smart power grids
substation automation
substation automation systems
substation security
Substations
Synthetic aperture sonar
telecommunication security
IEC 62351
Cryptographic Protocols
Denial-of-Service
devices attacks
encryption
generic object-oriented substation event
GOOSE messages
hardware requirements
IEC 61850
composability
IEC standards
international standard
latency constraints
latency requirements
Metrics
object oriented security
One-Time Pads
biblio
SDN Enabled Secure IoT Architecture
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
resource-constrained devices
Software Defined Network (SDN) Security
Precision agriculture
Policy based Secure IoT Architecture
lightweight protocol
IoT network infrastructure security
IoT Authentication and Access Control
Internet of Things (IoT) Security
integrated security approach
authenticated malicious IoT devices
Network Security Architecture
cyber systems
critical national infrastructure
computer network security
Software Defined Networks
Logic gates
control systems
SDN
authentication
pubcrawl
Resiliency
software defined networking
computer architecture
Protocols
Cryptographic Protocols
Internet of Things
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
Bitcoin Security Reference Model: An Implementation Platform
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
digital wallet
security services
security risk minimization
security functional architecture
Scalability
Resiliency
pubcrawl
peer to peer security
P2P transaction
Metrics
IP protocol
IP networks
Human Factors
application protocol
digital money
decentralized payment system
Cybersecurity
Cryptographic Protocols
cryptocurrency
cryptocurrencies
Bitcoin security reference model
Bitcoin security features
bitcoin security
Bitcoin cyberattacks
bitcoin
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
open source Virtual Private Network
WireGuard virtual private network protocol
vpn
Virtual private networks
verification
transport data messages
standards
security protocols
pubcrawl
Protocols
protocol verification
privacy
policy-based governance
Policy Based Governance
authorisation
Noise Protocol Framework
IP networks
Elliptic curve cryptography
CryptoVerif proof assistant
Cryptographic Protocols
cryptographic protocol
cryptographic proof
computer network security
computational model
Compositionality
composability
collaboration
biblio
Security in Wireless Sensor Networks: A formal verification of protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
WSN technology
wireless sensor networks
telecommunication security
Security Properties
security breaches
Security analysis
security
secure transmissions
safe transmissions
real-time communications
pubcrawl
protocol verification
analyzed protocols
policy-based governance
Policy Based Governance
industrial domains
formal verification
Cryptographic Protocols
concerns security aspects
concerns improved guarantees
Compositionality
composability
complex networked control systems
collaboration
biblio
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
witness functions
Waste materials
telecommunication security
security vulnerability
security of data
security
Reliability
pubcrawl
protocol verification
collaboration
policy-based governance
Policy Based Governance
Needham-Schroeder symmetric-key protocol
formal verification
encryption
Cryptographic Protocols
Compositionality
composability
biblio
Automated Verification of Accountability in Security Protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
mechanized method
traditional trust assumptions
tools
security violation
security protocols
security protocol design
security property
pubcrawl
Protocols
protocol-agnostic definition
protocol verification
privacy
policy-based governance
Policy Based Governance
accountability
formal verification
formal methods and verification
Cryptography
Cryptographic Protocols
computer security
Compositionality
composability
collaboration
cognition
certificate transparency
Calculus
accountable algorithms protocol
accountability automated verification
biblio
Predictive Proof of Metrics – a New Blockchain Consensus Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:18pm
PPoM
predictive security metrics
reputation and reward based approach
reputation
provider prediction engine
Proof of Metrics
predictive proof of metrics
prediction
PPoM based blockchain
machine learning
Metrics
consensus protocol
blockchain ecosystems
blockchain consensus protocol
Cryptographic Protocols
security
pubcrawl
blockchain
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »