Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Protocols
biblio
Current Trends in Internet of Things Forensics
Submitted by grigby1 on Fri, 09/01/2023 - 3:20pm
Internet of Things
digital forensic DF
Human Factors
blockchains
Regulation
information forensics
digital evidence
Market research
Digital Forensics
Switches
Training
data acquisition
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Drone Forensics: A Case Study on DJI Mavic Air 2
Submitted by grigby1 on Fri, 09/01/2023 - 3:19pm
information forensics
Mavic Air 2
Drone Forensics
DJI
autonomous aerial vehicles
unmanned aerial vehicle
Human Factors
Costs
FTP
Communications technology
pubcrawl
Digital Forensics
Floods
Protocols
Scalability
performance evaluation
Resiliency
resilience
Metrics
Human behavior
biblio
Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
Submitted by grigby1 on Fri, 09/01/2023 - 2:24pm
Wireless communication
Multiple intelligent eavesdroppers
Human Factors
Nash Equilibrium
game theory
physical layer security
information theoretic security
Compositionality
Artificial Intelligence
Games
composability
deep learning
Protocols
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
collaboration
biblio
Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
Protocols
Two way authentication
secure authentication
legitimate node
insider attacks
ElGamal encryption
passwords
location awareness
Costs
Resiliency
Elliptic curve cryptography
Policy Based Governance
insider threat
web services
Cryptography
authentication
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
biblio
Blockchain-Based Decentralized Authentication for Information-Centric 5G Networks
Submitted by grigby1 on Fri, 08/25/2023 - 10:59am
computer architecture
pubcrawl
resilience
Resiliency
Scalability
authentication
5G mobile communication
Access Control
Protocols
Information Centric Networks
computer networks
information-centric networking
biblio
Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement
Submitted by grigby1 on Fri, 08/18/2023 - 4:14pm
Time series analysis
univariate time series
rs-485
multilayer perceptrons
Resiliency
ICS Anomaly Detection
Time measurement
autoencoder
Physical layer
Anomaly Detection
industrial control system
integrated circuits
industrial control
Protocols
Scalability
security
resilience
pubcrawl
biblio
The Use of Blockchain for Digital Identity Management in Healthcare
Submitted by grigby1 on Thu, 08/17/2023 - 4:39pm
Protocols
KYC
digital identification
fraud
blockchains
Memory
Self-Sovereign Identity
standardization
Industries
blockchain
Medical services
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Cross-Layer Design for UAV-Based Streaming Media Transmission
Submitted by grigby1 on Thu, 08/03/2023 - 1:56pm
Packet loss
Forward Error Encryption
multi-link concurrent transmission
FEC
cross-layer design
Cross layer design
uav
QoS
quality of service
Servers
Payloads
Streaming media
composability
Protocols
Resiliency
resilience
Metrics
pubcrawl
biblio
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
Submitted by grigby1 on Mon, 07/31/2023 - 1:24pm
Cryptography
pseudorandom numbers
Pollard’s ρ
Elliptic curve cryptography (ECC)
Fuzzy Cryptography
Fuzzy logic
Internet of Things (IoT)
Elliptic curve cryptography
Protocols
Internet of Things
authentication
Scalability
Resiliency
resilience
Metrics
pubcrawl
security
biblio
A New False Data Injection Detection Protocol based Machine Learning for P2P Energy Transaction between CEVs
Submitted by grigby1 on Fri, 07/21/2023 - 2:42pm
resilience
Short Vector Machine
Connected Electric Vehicles
Resiliency
false data injection attack
smart contract
Electric Vehicles
False Data Detection
Transportation
simulation
Support vector machines
Training data
composability
Urban areas
Protocols
Human behavior
pubcrawl
blockchain
machine learning
1
2
3
4
5
6
7
8
9
…
next ›
last »