Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adversary
biblio
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 12/01/2020 - 12:48pm
intrusion detection system
Robustness
Resiliency
resilience
pubcrawl
Probes
Perturbation methods
network security suite
network intrusion detection systems
ML-based IDS
ML models
malware
malicious network traffic
malicious intrusions
adversarial attacks thwarting
IDS
generative adversarial networks
gan
Gallium nitride
feature extraction
computer network security
composability
anomalous traffic
adversary
adversarial perturbations
adversarial ML attack
Adversarial Machine Learning
biblio
A Scalable Correlation Clustering strategy in Location Privacy for Wireless Sensor Networks against a Universal Adversary
Submitted by aekwall on Mon, 10/26/2020 - 11:02am
correlation methods
Location Privacy in Wireless Networks
wireless network sensors
universal adversary
scalable correlation clustering strategy
remote Environment
adversary
information privacy
telecommunication network planning
Compositionality
Semantics
energy consumption
scalable
telecommunication security
sensors
trust
Correlation
Metrics
sensor placement
privacy
location privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
security
biblio
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
telecommunication network routing
Location Privacy in Wireless Networks
tactically positioned agent nodes
source location privacy
random routing techniques
random routing
Phantoms
agent node routing
agent node
adversary
Position measurement
source node
WSN
Compositionality
Safety
Metrics
sensor placement
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
Monitoring
biblio
Resilient consensus protocol in the presence of trusted nodes
Submitted by willirn1 on Thu, 05/30/2019 - 1:51pm
resilience
Vanderbilt
dominating set
adversary
graph robustness
Consensus
Buildings
Tree graphs
Topology
network topology
network theory (graphs)
Robustness
Protocols
connected dominating set
adversarial attacks
nonlocal information access
resilient distributed consensus problem
trusted nodes notion
resilient consensus protocol
biblio
Modeling of quantum channel parameters impact on information exchange security
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
Polarization
unauthorized access
software packages
Scalability
Resiliency
Quantum Key Distribution
quantum information exchange computer emulator
quantum computing security
quantum computing
quantum computer
quantum communication channel
quantum channel parameters impact modeling
quantum channel imperfections
Qt Creator C++ program package
pubcrawl
Protocols
adversary
photons
Photonics
Metrics
information security
information exchange security
Human behavior
Cryptography
cryptographic security
cryptanalysis
C++ language
authorisation
attenuation
attack on the protocol
Adversary Models
biblio
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN
Submitted by grigby1 on Wed, 01/16/2019 - 1:26pm
Internet of Things
pubcrawl
Resiliency
composability
6LoWPAN
adversary
attack
Fragmentation
security service
threat
biblio
False Data Injection Attacks Targeting DC Model-Based State Estimation
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
power system state estimation
Transmission line measurements
Topology
state variable target
state estimation
specific targets
smart power grids
Smart Grid
security of data
secure operation
Scalability
Resiliency
resilience
Q measurement
pubcrawl
pre-specified meter target
adversary
power system security
power engineering computing
network topology
Metrics
Meters
Manganese
Human behavior
grid operator
false data injection attack
economic operation
DC model
cyber-attacks
attacking vector
Adversary Models
biblio
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
Software
on-demand software
Probabilistic logic
probabilistic model
pubcrawl
resilience
Resiliency
Scalability
security of data
noncompromised software
software fault tolerance
software fault-tolerance
software maintenance
software maintenance policies
software reliability
sophisticated synchronized attacks
synchronized attacks system reliability
telecommunication security
fault tolerant architecture
adversary
Adversary Models
computer security
cyber-attacks
cyber-security controls
diverse software
failure regions
fault tolerance
adequate adversary model
Fault tolerant systems
fault-tolerant software
Human behavior
independent attacks
industrial control applications
industrial protection systems
Metrics
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 2:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Fri, 05/01/2015 - 7:34am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary
1
2
next ›
last »