Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Analyzing Metadata in PDF Files Published by Police Agencies in Japan
Submitted by grigby1 on Thu, 06/22/2023 - 3:14pm
software reliability
sanitization
PDF files
Open Data
Resiliency
law enforcement
targeted attacks
Data Sanitization
software quality
hidden data
computer architecture
Compositionality
component
metadata
composability
resilience
pubcrawl
security
Organizations
biblio
Secured framework for privacy preserving healthcare based on blockchain
Submitted by grigby1 on Thu, 06/22/2023 - 3:12pm
Compositionality
key
blockchains
Resiliency
Healthcare
Biomedical monitoring
medical treatment
Data Sanitization
Scalability
cloud
privacy
Data Security
blockchain
sensors
composability
data privacy
security
resilience
pubcrawl
IoT
biblio
Detection and Mitigation of DDoS attack in Software Defined Networking: A Survey
Submitted by grigby1 on Thu, 06/22/2023 - 1:17pm
Industries
Switches
Software Defined Network
Resiliency
resilience
pubcrawl
network security
network function virtualization
mitigation
Metrics
dynamic networks
Human behavior
Floods
Dynamic scheduling
detection
denial-of-service attack
DDoS attack mitigation
DDoS
composability
security
biblio
DDoS Attack using SYN Flooding: A Case Study
Submitted by grigby1 on Thu, 06/22/2023 - 1:17pm
DDoS attack mitigation
SYN Flooding Attack
mitigation techniques
Covid
metasploit
Distributed Denial of Service (DDoS)
Resiliency
denial-of-service attack
Cyberspace
Wireshark
botnet
security
malware
Floods
composability
telecommunication traffic
internet
resilience
Metrics
Human behavior
pubcrawl
biblio
Detection and Prevention of UDP Reflection Amplification Attack in WSN Using Cumulative Sum Algorithm
Submitted by grigby1 on Thu, 06/22/2023 - 1:10pm
Interference
WSN (wireless sensor network)
UDP reflection
DOS (Denial of service)
Amplification attacks
(Distributed denial of service)
DDoS Attack Prevention
Resiliency
DDoS
Resists
denial-of-service attack
security
surveillance
traffic control
Compositionality
composability
Wireless communication
wireless sensor networks
resilience
Metrics
pubcrawl
biblio
Systematic review on mitigating and preventing DDoS attacks on IoT networks
Submitted by grigby1 on Thu, 06/22/2023 - 1:09pm
Proposals
Prevention
DDoS Attack Prevention
Resiliency
mitigation
denial-of-service attack
MQTT
CoAP
Systematics
Compositionality
Internet of Things
DDoS Attacks
composability
Computer crime
Protocols
resilience
Metrics
pubcrawl
IoT
security
biblio
A Review on Cloud Data Assured Deletion
Submitted by grigby1 on Fri, 06/16/2023 - 2:56pm
Artificial Intelligence
assured deletion
cloud data security
data deletion
data privacy
encryption
information technology
key management
multi-replica association
pubcrawl
robots
Scalability
security
verification feedback
biblio
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem
Submitted by grigby1 on Fri, 06/09/2023 - 1:19pm
Ecosystems
Cyber Dependencies
explosives
Resiliency
Stakeholders
Compositionality
cognition
Libraries
composability
security
Scalability
Software
resilience
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Analysis Method of Security Critical Components of Industrial Cyber Physical System based on SysML
Submitted by grigby1 on Fri, 06/09/2023 - 1:18pm
composability
SysML
industrial cyber physical systems
dependency graph
Cyber Dependencies
Resiliency
software tools
testing
Compositionality
Task Analysis
security
Big Data
Databases
Scalability
Analytical models
resilience
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Development of Cyber Attack Model for Private Network
Submitted by grigby1 on Fri, 06/09/2023 - 1:18pm
cyberattack
private network
network threat
LAN
firewalls
DMZ
cyber threat
Cyber Dependencies
Backdoor
Payload
Resiliency
honeypot
network vulnerabilities
cyber attack
Technological innovation
security
Python
Compositionality
malware
composability
Companies
Computational modeling
Scalability
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Servers
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »