Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
open systems
biblio
Application of Random Forest Classifier for Prevention and Detection of Distributed Denial of Service Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 1:09pm
rendering (computer graphics)
open systems
multiple regression
DDoS Attack Prevention
Resiliency
denial-of-service attack
DDoS Attack
regression analysis
DoS attack
Predictive models
Transportation
Compositionality
composability
Computer crime
resilience
Metrics
pubcrawl
machine learning
biblio
Same Form, Different Payloads: A Comparative Vector Assessment of DDoS and Disinformation Attacks
Submitted by grigby1 on Fri, 02/17/2023 - 4:28pm
pubcrawl
Human behavior
Conferences
Scalability
Cybersecurity
Computers
Law
DDoS
social networking (online)
Media
standardization
disinformation
mechatronics
threat assessment
open systems
Social Agents
biblio
OWASP Attack Prevention
Submitted by grigby1 on Fri, 02/03/2023 - 2:51pm
Knowledge engineering
Web Application Firewall
open systems
SQL injection detection
Communication Systems
cross-site scripting
OWASP
security vulnerabilities
Web servers
pubcrawl
SQL injection
Firewalls (computing)
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 10:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Managing the Evolution to Future Internet Architectures and Seamless Interoperation
Submitted by grigby1 on Tue, 03/16/2021 - 1:11pm
network management perspective
interoperability
IoT
IP networks
Logic gates
Metrics
MobilityFirst
NDN
network architecture
internetworking
network servers
open systems
policy-based approach
Protocols
pubcrawl
resilience
Resiliency
seamless interoperation
encryption
architectural island separation
clean slate
COIN
collaboration
computer architecture
computer network management
content retrieval
content-oriented interoperability framework
application-layer object resolution service
Future Internet Architectures
Human behavior
ICN
industrial automation
information-centric networking
information-centric networks
internet
Internet architectures
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Research on Intelligent Security Protection of Privacy Data in Government Cyberspace
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
protection efficiency
intelligent discovery
intelligent security protection
learning (artificial intelligence)
machine learning
Metrics
middleware
NLP
open systems
privacy protection
improved masking process
pubcrawl
resilience
Resiliency
Scalability
security
sensitive data discovery
static masking
structured privacy data
unstructured privacy data
data source
automatic execution
automatic recommendation
big data privacy
categorization and classification
Classification algorithms
data analysis
data masking algorithm
Data models
data privacy
agent-based intelligent masking middleware
dynamic masking
Government
government cyberspace
government data masking process
government data processing
government privacy data
government unstructured text
Human behavior
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment
Submitted by grigby1 on Tue, 11/17/2020 - 1:58pm
middleware
tactical networks
sensors
Scalability
Resiliency
resilience
pubcrawl
process control
open systems
Object recognition
network management
multiforce environment
multiforce cooperation
multi-robot systems
military systems
battlefield scenarios
machine learning
IoT
iobt
interoperable control
interoperability
Internet of Things
Internet of battlefield things
innovative solutions
innovative paradigm
Human Factors
heterogeneous IoBT devices
Bridges
Big Data
1
2
3
4
5
next ›
last »