Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
denial-of-service attack
biblio
Bandwidth Allocation Strategy of Networked Control System under Denial-of-Service Attack
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
Metrics
time-constrained DoS attack
Stability criteria
security
Resiliency
resilience
pubcrawl
Networked Control Systems Security
networked control systems
networked control system (NCS)
Networked Control System
NCS communication channel
Bandwidth
Dynamic scheduling
Dynamic Networks and Security
dynamic bandwidth allocation structure
dynamic bandwidth allocation
denial-of-service attack
denial of service attack
control systems
computer network security
composability
Channel allocation
bandwidth allocation
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
biblio
Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
machine learning techniques
WSN
wireless sensor networks
threat vectors
Support vector machines
security threats
security
Routing protocols
pubcrawl
privacy
Metrics
Measurement
attack signature
learning (artificial intelligence)
intrusion detection-and-prevention system
intrusion detection system
hardware resources
DoS attacks
denial-of-service attack
denial of service
decision trees technique
Decision trees
computer network security
biblio
A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
trust model
Trust Management.
TCP SYN flooding attacks
security of data
security mechanisms
security
Resiliency
resilience
Receivers
pubcrawl
packet dropping attacks
Anomaly Detection
intrusion detection system
Intrusion Detection
Fuzzy logic
distributed denial of service attacks
distributed denial of service
denial-of-service attack
denial of service
counter-security issues
computer resources
Computer crime
biblio
Error Handling of In-vehicle Networks Makes Them Vulnerable
Submitted by grigby1 on Wed, 05/17/2017 - 1:57pm
automotive cybersecurity
controller area network security
controller area networks
denial-of-service attack
error handling
Internet of Things
Internet of Things (IoT)
pubcrawl
Resiliency
biblio
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
message authentication
Yung-Cheng-Lee's protocol
verification table
user impersonation attack
smart cards
Smart card
session key
Servers
server impersonation attack
remote user authentication protocol
Protocols
password change phase
authentication
legitimacy verification
insider attacks
insecure channel
dynamic id
denial-of-service attack
Cryptography
Cryptographic Protocols
cryptanalysis
computer network security
Bismuth
biblio
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:56am
Kalman filters
χ2-detector
state processes
smart-grid systems security
smart power grids
Smart Grids
security
robust security framework
random attack
predictor variables
power system security
power engineering computing
Mathematical model
communication infrastructure
Kalman filter smart grid
Kalman filter
fault diagnosis
false data-injection attack
false data injection attack
Euclidean detector
DoS attack
Detectors
dependent variables
denial-of-service attack
Cyber Physical System
computer network security
biblio
Attacks and Defenses in the Data Plane of Networks
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
NetFPGA
software-programmable network processors
software vulnerabilities
security issues
Routing protocols
programmable router
Program processors
processing monitor
packet processing software
packet forwarding
network security
network routers
network processor
network attack
Computer crime
logic devices
internet
hardware-based defense mechanism
field programmable gate arrays
embedded systems
embedded system security
denial-of-service attack
data plane
custom-logic hardware
control plane
computer networks
computer network security
« first
‹ previous
…
7
8
9
10
11
12
13
14
15