Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical information
biblio
Prevention of DoS Attacks by Detection of Multiple Malicious Nodes in VANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Roads
network throughput
packet delivery ratio
Packet detection
packet detection algorithm
packet loss ratio
pubcrawl
resilience
Resiliency
network availability
Safety
Safety messages
Technology management
VANET
VANETs
vehicle nodes
vehicular ad hoc networks
vehicular adhoc network
driver safety
automation
Compositionality
computer network security
critical information
Denial of Service attacks
detection algorithms
DoS attacks
DoS attacks prevention
manet attack prevention
irrelevant data
irrelevant packets
Jamming
malicious nodes
MANET Attack Detection
Metrics
multiple malicious nodes
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 12:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
Developing a Secure Cyber Ecosystem for SCADA Architecture
Submitted by aekwall on Mon, 07/01/2019 - 9:09am
Monitoring
Terrorism
states security system
security of data
secure Cyber ecosystem
SCADA Systems Security
SCADA systems
SCADA network systems
SCADA architecture
SCADA
RTU
robust cyber security
pubcrawl
PLC
network attack
Resilient Security Architectures
Industries
Human behavior
Global village
cyber terrorism
cyber resilience
Cyber invasions
Cyber Attacks
critical infrastructure
critical information
Conferences
computer security
composability
CII
Resiliency