Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
man-in-the-middle
biblio
Testing the Resiliency of Consumer Off-the-Shelf Drones to a Variety of Cyberattack Methods
Submitted by grigby1 on Fri, 03/17/2023 - 10:20am
Rotors
unmanned aerial systems
MITM
Drone
UAS
distributed denial-of-service
man-in-the-middle
spoofing
Frequency measurement
Government
pubcrawl
Cybersecurity
DDoS
network security
Computer crime
cyberattack
Protocols
Safety
Resiliency
resilience
biblio
Multi-Qubit Size-Hopping Deutsch-Jozsa Algorithm with Qubit Reordering for Secure Quantum Key Distribution
Submitted by grigby1 on Thu, 07/14/2022 - 3:41pm
Public key
quantum computing security
Quantum Workforce
Quantum Teacher’s Training
quantum information science
Quantum Education
man-in-the-middle
Cirq
Quantum Key Distribution
Qubit
public key infrastructure
Entropy
Computational modeling
Scalability
Conferences
pubcrawl
security
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
Countermeasure for Identification of Controlled Data Injection Attacks in Networked Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
countermeasure
Networked Control Systems Security
Transfer functions
System Identification
Networked Control System
man-in-the-middle
malicious agent
link monitoring strategy
linear time-invariant transfer functions
Linear systems
industrial control system
Gaussian noise
data injection attack
security of data
controlled data injection attack identification
Identification
networked control systems
Predictive Metrics
Communication networks
production engineering computing
Industry 4.0
composability
pubcrawl
Resiliency
security
Monitoring
biblio
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:29pm
man-in-the-middle
Sensors and Actuators
sensor spoofing
sensor security
security
Resiliency
pubcrawl
physical attacks
Metrics
actuator security
IoT security
Internet of Things (IoT)
Human behavior
Device Fingerprinting
cyber physical systems
CPS/ICS Security
composability