Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Lightweight Security Data Streaming, Based on Reconfigurable Logic, for FPGA Platform
Submitted by grigby1 on Wed, 08/18/2021 - 11:14am
Ciphers
Clocks
Cryptography
cyber security
field programmable gate arrays
FPGA
Hardware Security
Lightweight
Lightweight Ciphers
pubcrawl
Reconfigurable Logic
Registers
resilience
Resiliency
Scalability
stream ciphers
biblio
Direct Trust-based Detection Algorithm for Preventing Jellyfish Attack in MANET
Submitted by aekwall on Mon, 08/02/2021 - 3:11pm
MANET Attack Detection
wireless sensor networks
Throughput
security
Resiliency
pubcrawl
mobile ad hoc networks
Metrics
MANET security
manet attack prevention
MANET
Jellyfish Attack
Direct Trust based Detection.
delays
cyber security
Conferences
Compositionality
Aerospace electronics
biblio
Enhancing Security Measures of AI Applications
Submitted by grigby1 on Tue, 07/27/2021 - 12:30pm
applications
Artificial Intelligence
Computer hacking
cyber security
defenses
Future
Proposals
pubcrawl
Reliability
resilience
Resiliency
robots
Scalability
Security by Default
biblio
Research on Cyber Security Test Method for GNSS of Intelligent Connected Vehicle
Submitted by grigby1 on Wed, 06/30/2021 - 3:39pm
automobiles
Compositionality
computer security
cyber security
Global navigation satellite system
GNSS
Intelligent connected vehicle
intelligent data
Interference
pubcrawl
Receivers
resilience
Resiliency
Scalability
security
Test methods
biblio
Artificial Intelligence Cyber Security Strategy
Submitted by grigby1 on Thu, 05/13/2021 - 11:58am
deep learning
Trade-off
strategy
security
resilience
pubcrawl
privacy
Predictive models
Personal Identifiable Information (PII)
Law
Human behavior
Government
General Data Protection Regulation (GDPR)
Pervasive Computing Security
Data Governance
cyber security
COVID-19
Computer crime
composability
artificial intelligence security
Artificial Intelligence (AI)
Artificial Intelligence
Metrics
Human Factors
Scalability
Resiliency
biblio
Unmasking Windows Advanced Persistent Threat Execution
Submitted by grigby1 on Wed, 05/05/2021 - 12:58pm
dataset
statistical analysis
security
Scalability
sandboxing
pubcrawl
policy-based governance
Manuals
Industries
feature extraction
advanced persistent threat
data privacy
cyber security
Conferences
composability
collaboration agreements
collaboration
APT Execution
APT
biblio
Host-Oriented Approach to Cyber Security for the SCADA Systems
Submitted by grigby1 on Wed, 05/05/2021 - 12:31pm
Computers
SCADA Systems Security
SCADA/ICS
DLL injection
Code injection
fileless malware
System software
SCADA System Security
SCADA
Compositionality
malware
machine learning
Computer crime
SCADA systems
process control
cyber security
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Anomaly-based IDS to Detect Attack Using Various Artificial Intelligence Machine Learning Algorithms: A Review
Submitted by grigby1 on Fri, 04/09/2021 - 11:34am
IDS
Signature-based Intrusion Detection Systems & Anomaly-based Intrusion Detection Systems
NSL-KDD
multiple machine learning algorithms
machine learning algorithms
identifying attacks
ID
detect attack
current IDS
computer safety hazards
complex & increasing tasks
artificial intelligence & machine learning algorithms
anomaly-based IDS
accurate intrusion detection
learning (artificial intelligence)
cyber-attacks
resilience
computer networks
Attack detection
network security
composability
intrusion detection system
Artificial Intelligence
computer network security
Resiliency
pubcrawl
cyber security
security of data
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »