Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security methods
biblio
Analysis of Efficient Network Security using Machine Learning in Convolutional Neural Network Methods
Submitted by grigby1 on Fri, 12/09/2022 - 5:56pm
encryption
machine learning
Organizations
pubcrawl
Human behavior
Metrics
Resiliency
network security
Instruments
composability
resilience
learning (artificial intelligence)
artificial intelligence security
education
IoT technology
security methods
biblio
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Submitted by aekwall on Mon, 10/05/2020 - 11:47am
embedded systems
technology manufacturers
serious embedded security challenges
Security Regulation
security of data
security methods
security foundation
security breach
Response
Recover
pubcrawl
next-generation critical infrastructure
microarchitectural characteristics
international security regulations
embedded technologies
Resilient Security Architectures
embedded security requirements
embedded security microarchitecture
embedded security domains
embedded architectures
Cyber-Physical Embedded System
Cyber Resilient Embedded System
cyber resilience
cyber physical systems
critical infrastructures
critical infrastructure
CPS resilience
business operations
Active Defence
Resiliency
biblio
Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
mobile ad hoc environment
telecommunication security
security methods
security
Secure Routing
Routing protocols
Resiliency
resilience
pubcrawl
outlier detection
network simulator tool
mobile ad hoc networks
ad hoc-on-demand distance vector reactive routing protocol
Metrics
MANET
efficient outlier detection scheme based security algorithm
Conferences
Compositionality
Black hole attack
Attack detection
AODV routing protocol
AODV
Anomaly Detection
Algorithm design and analysis