Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
performance evaluation
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 10:37am
Systematics
untrusted device
towards systematic design
Systematic Design
single-device RA
single device
remote exploits
prior collective RA schemes
place collective RA
networked embedded devices
embedded system security
concrete collective RA scheme
collective remote attestation protocols
Collective Remote Attestation
remote device
data privacy
malware detection
Topology
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Software
Protocols
performance evaluation
security
Hardware
attestation
biblio
RADIS: Remote Attestation of Distributed IoT Services
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
RADIS
distributed IoT service
Distributed IoT Services
inter-operable IoT system
Interoperable IoT
interoperable IoT devices
malicious remote service
modified software detection
physical tampering attacks
control-flow attestation technique
Remote Attestation
remote attestation of distributed IoT services
remote attestation protocols
remote trusted party
security technique
Service Flow
trust-worthiness
Trusted Computing
Monitoring
Internet of Things
IoT devices
attestation
security
performance evaluation
Protocols
Software
computer network security
Resiliency
Human behavior
pubcrawl
composability
Cameras
open systems
Internet of Things systems
biblio
A Practical Attestation Protocol for Autonomous Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:35am
remote device
secure operation
safe operation
PASTA
network disruptions
Mesh networks
low-end verifier devices
low-end prover devices
low-end embedded devices
existing attestation protocols
connected embedded devices
collective attestation
autonomous system
autonomous networks
autonomous embedded systems
arbitrary device outages
Internet of Things
security guarantees
Scalability
Embedded System
computer networks
Robustness
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Protocols
performance evaluation
security
Remote Attestation
attestation
biblio
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A
Submitted by grigby1 on Fri, 08/14/2020 - 10:44am
ARMv8-A processor
application programming interface
tablets
suspected Flush+Reload
static code analysis schemes
secure collaborative API
obfuscation techniques
mobile phones
Flush+Reload attack
Flush+Flush cache attacks
Flush+Flush attack
flush operation API
Collabo rative API
security of data
ARMv8 A
Compositionality
application program interfaces
APIs
program diagnostics
performance evaluation
cache storage
mobile computing
microprocessor chips
Resiliency
resilience
pubcrawl
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 11:14am
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices
Submitted by aekwall on Mon, 07/20/2020 - 9:45am
white-box attacks
white box cryptography
white-box attack contexts
wearabledevices
wearable consumer electronic devices
wearable computing
random secret components
random padding
physical nature
low computational power
limited memory
lightweight white box encryption scheme
decryption algorithms
Consumer electronics
Cryptography
cryptosystem
wearable computers
Wearable devices
Context
privacy protection
pubcrawl
Data mining
Metrics
composability
Resiliency
performance evaluation
encryption
biblio
Performance Evaluation of Some Industrial Loss of Field Protection Schemes Using a Realistic Model in The RTDS
Submitted by grigby1 on Thu, 07/16/2020 - 10:43am
Relays
phase domain model
power generation
power generation faults
power generation protection
power plants
pubcrawl
real-time-digital-simulator
realistic power generation unit
realistic system
relay protection
performance evaluation
Reliability
resilience
Resiliency
Rotors
security viewpoints
simulations
synchronous generator
Synchronous generator protection
synchronous generators
industrial loss
ANSI code
composability
CPS modeling
earthing
field protection schemes
field relay
IEEE standards
Impedance
important protection functions
industrial LOF protection schemes
admittance based schemes
Loading
LOF events
LOF relay
LOF studies
loss of field
loss of field relay
machine protection
Metrics
overvoltage protection
biblio
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 12:27pm
IIoT devices
typical IoT devices
security bootstrapping
Scalability
Resiliency
resilience
pubcrawl
Production facilities
performance evaluation
Payloads
manual device configuration
intranets
Internet of Things devices
Internet of Things
Inspection
industrial enterprise networks
authorisation
enterprise management
DPI-enabled intranets
DPI proxy certificate authority certificates
DPI proxy CA
DPI policies
deep packet inspection proxies
deep packet inspection
Cryptography
conventional computing devices
computer network security
computer bootstrapping
chicken-and-egg problem
certification
bootstrapping security configuration
biblio
Using advanced detection and prevention technique to mitigate threats in SDN architecture
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
SDN architecture
services deployment
SDN threats
OpenFlow KPG-MT
MITM
man in the middle attacks
malware-based attacks
KPG-MT
DoS/DDoS
distributed SDN
centralized network abstraction
DDoS Attack Prevention
centralized architecture
security devices
Denial of Service attacks
Software Defined Networks
Computer crime
malwares
SDN
authentication
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer architecture
invasive software
performance evaluation
malware
computer network security
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »