Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet technology
biblio
The Establishment of Internet-Based Network Physical Layer Security Identification System
Submitted by grigby1 on Fri, 02/03/2023 - 3:37pm
pubcrawl
Metrics
resilience
Resiliency
internet
5G mobile communication
composability
network security
internet technology
Error analysis
Physical layer
physical layer security
Symbols
network physical layer
security identification system physical layer network coding
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
Energy Data Security and Multi-Source Coordination Mechanism Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
blockchain-based energy data supervision
transaction model
summary directory tree
multisource synergy mechanism
multisource coordination mechanism
multisource collaboration
multi-source collaboration
internet technology
energy industry
energy data security
consensus mechanism
clean energy
Scalability
blockchain security
blockchain technology
power system security
power engineering computing
Distributed databases
internet
pubcrawl
Resiliency
Data Security
Cryptography
biblio
A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Trusted Computing
software metrics
software reliability
software security
software trust measurement
software trustworthiness
software trustworthy security growth model
software vulnerability datasets
trust measurement
Software measurement
unified measurable software trustworthy model
vulnerability loss speed index
vulnerability occurrence time
vulnerability severity prediction model
Vulnerability severity/type
Vulnerability time
vulnerability time occurrence
complex composite concept
software domain
Software
security
risk analysis
pubcrawl
probability
privacy models and measurement
predictive security metrics
Predictive models
Metrics
loss metric value
Loss measurement
internet technology
Indexes
future loss speed index
biblio
Image Steganography Based on Hybrid Edge Detector to Hide Encrypted Image Using Vernam Algorithm
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
LSB method
word length 64800.0 bit
word length 3.0 bit
word length 2.0 bit
Vernam cipher algorithm
Vernam algorithm
steganography detection
Steganography
shift registers
secret image bits
pubcrawl
pseudorandom key
privacy
NonLinear Feedback Shift Register
multimedia technology
Metrics
and edge detector
least significant bit steganography
internet technology
information security
Image Steganography
Hybrid Sobel edge detector
hybrid Kirch edge detector
hiding image
Geffe generator
encrypted image
edge pixel
edge detection
data encapsulation
Cryptography
composability
baboon cover image