Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Protocols
biblio
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Submitted by grigby1 on Fri, 01/13/2023 - 12:52pm
Linux
shodan
Conpot
deception
MIMICs
Security by Default
honeypots
XML
Reconnaissance
SCADA
Servers
programming
Cybersecurity
ICs
Protocols
Scalability
network security
Resiliency
resilience
pubcrawl
biblio
A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 12:50pm
Support vector machines
Intrusion Detection
pubcrawl
resilience
Resiliency
Radio frequency
Scalability
Protocols
network security
deep learning
Intrusion Detection System (IDS)
Virtualization
Sensitivity
Security by Default
computer networks
software-defined network (SDN)
biblio
Analysis of Dynamic Host Control Protocol Implementation to Assess DoS Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 12:49pm
Protocols
Port Security
DHCP Starvation
DHCP Snooping
DHCP Security
DHCP Flooding
dhcp
Security by Default
Integrated optics
Wireless communication
Organizations
Scalability
performance evaluation
network security
Resiliency
resilience
pubcrawl
IP networks
security
biblio
PortSec: Securing Port Knocking System using Sequence Mechanism in SDN Environment
Submitted by grigby1 on Fri, 01/13/2023 - 12:49pm
security
pubcrawl
resilience
Resiliency
Scalability
Protocols
Wireless communication
control systems
SDN
Firewalls (computing)
Security by Default
security threats
Behavioral sciences
P4 programming
Port knocking Security
Ports (Computers)
biblio
Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism
Submitted by grigby1 on Fri, 01/06/2023 - 4:33pm
network-on-chip
System recovery
SystemC TLM
Recovery Mechanism
Systems architecture
MPSoC
Interference
Scalability
simulation
encryption
Program processors
Protocols
authentication
Resiliency
resilience
pubcrawl
security
biblio
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
Submitted by grigby1 on Fri, 01/06/2023 - 4:06pm
navigation
Radar Dataset
NMEA0183
NavicoBR24
Maritime Cyber Security
marine radar
radar imaging
radar detection
Radar tracking
Radar
pubcrawl
AIS
Air gaps
taxonomy
composability
Protocols
Resiliency
resilience
Metrics
Human behavior
biblio
Semantic data integration in upgrading hydro power plants cyber security
Submitted by grigby1 on Fri, 01/06/2023 - 4:06pm
cyber security
semantic alignment
hydro power plants
communication and information technologies
Soft sensors
Air gaps
industrial automation
Semantics
composability
process control
risk management
Protocols
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
Data collection
biblio
An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
Submitted by aekwall on Thu, 01/05/2023 - 5:12pm
reverse engineering
embedded systems
Internet of Things
authentication
Protocols
pubcrawl
Metrics
Resiliency
composability
Fingerprint recognition
Very large scale integration
sybil attacks
biblio
A Diagnostic survey on Sybil attack on cloud and assert possibilities in risk mitigation
Submitted by aekwall on Thu, 01/05/2023 - 5:11pm
cloud
Cloud Computing
composability
Metrics
Protocols
pubcrawl
Random key Redistribution
Resiliency
Resistance
resource allocation
self-organizing networks
social networking (online)
Switches
sybil attacks
taxonomy
biblio
Efficient Public Verification of Confidential Supply-Chain Transactions
Submitted by grigby1 on Thu, 01/05/2023 - 2:28pm
pubcrawl
resilience
Resiliency
Protocols
Production
network security
secret sharing
Sociology
supply chains
Homomorphic encryption
distributed ledger
Pressing
supply chain security
Distributed Ledger Technology
Proxy re-encryption
supply-chain verification
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »