Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Protocols
biblio
Systematic review on mitigating and preventing DDoS attacks on IoT networks
Submitted by grigby1 on Thu, 06/22/2023 - 2:09pm
Proposals
Prevention
DDoS Attack Prevention
Resiliency
mitigation
denial-of-service attack
MQTT
CoAP
Systematics
Compositionality
Internet of Things
DDoS Attacks
composability
Computer crime
Protocols
resilience
Metrics
pubcrawl
IoT
security
biblio
An QUIC Traffic Anomaly Detection Model Based on Empirical Mode Decomposition
Submitted by grigby1 on Thu, 06/22/2023 - 1:45pm
pubcrawl
Human behavior
Metrics
internet
Protocols
telecommunication traffic
composability
Routing
network traffic
Switches
simulation
QUIC
Empirical mode decomposition
decomposition
Hurst parameters
the Empirical Mode Decomposition
biblio
Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms
Submitted by grigby1 on Fri, 06/02/2023 - 4:30pm
pubcrawl
Analytical models
boosting
codes
cyber security
dark web
darknet
feature extraction
Human behavior
Human Factors
machine learning
network traffic
Prediction algorithms
Protocols
Training
biblio
Cross-Layer Authentication based on Physical-Layer Signatures for Secure Vehicular Communication
Submitted by grigby1 on Tue, 05/30/2023 - 3:19pm
Cross Layer Security
Physical-Layer Signatures
Cross-Layer Authentication
communication security
Costs
Compositionality
composability
public key infrastructure
Wireless communication
pubcrawl
Computational modeling
Protocols
Cryptography
authentication
Heuristic algorithms
Resiliency
resilience
biblio
A Comparative Study on Machine Learning based Cross Layer Security in Internet of Things (IoT)
Submitted by grigby1 on Tue, 05/30/2023 - 3:17pm
composability
Cross layer design
Energy Efficiency
interoperability
Internet of Things
Scalability
renewable energy sources
wireless networks
Compositionality
computer architecture
Cross Layer Security
Protocols
privacy
Resiliency
resilience
pubcrawl
security
machine learning
biblio
Exploring Security Testing Methods for Cyber-Physical Systems
Submitted by grigby1 on Fri, 05/26/2023 - 4:31pm
CPS Security
Systems
information vulnerabilities
information threats
information attacks
cyber-physical system security testing
cyber-physical object
passwords
Resiliency
Stability analysis
cyber-physical systems
collaboration
Fault tolerant systems
fault tolerance
composability
Protocols
Scalability
resilience
policy-based governance
Human behavior
pubcrawl
security
biblio
A timestamp-based covert data transmission method in Industrial Control System
Submitted by grigby1 on Fri, 05/19/2023 - 2:27pm
Compositionality
ICMP
Resiliency
data science
Iptables
covert channels
covert channel
Firewalls (computing)
resilience
security
Linux
Data Security
industrial control system
integrated circuits
industrial control
Protocols
Scalability
pubcrawl
biblio
Covert Channel Detection Methods
Submitted by grigby1 on Fri, 05/19/2023 - 2:27pm
security
pubcrawl
Software
Scalability
Protocols
Task Analysis
Compositionality
resilience
Firewalls (computing)
software reliability
timing
statistical analysis
covert channel
covert channels
Resiliency
V2X communication
biblio
Security Foundations for Application-Based Covert Communication Channels
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
resilience
privacy-enhancing technologies
censorship
and censorship
Resiliency
Security Foundations
Communication channels
anonymity
covert channels
security
Syntactics
Compositionality
cognition
Protocols
privacy
Scalability
pubcrawl
biblio
On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond
Submitted by grigby1 on Fri, 05/19/2023 - 2:26pm
covert channel
random hashing
MAC layer security
Downlink
6G
Resiliency
5G security
Media Access Protocol
Data Exfiltration
covert channels
security
machine-to-machine communications
resilience
Compositionality
Protocols
5G mobile communication
Scalability
performance evaluation
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »