Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware
Submitted by grigby1 on Thu, 07/30/2020 - 2:14pm
IoT devices
security
secure IoT system
REST API
Resiliency
resilience
representational state transfer API
pubcrawl
middleware
Metrics
Logic gates
IoT systems
IoT security
application program interfaces
IoT applications
IoT
Internet of Things
Human Factors
Human behavior
fairly disruptive technology
data privacy
computer network security
composability
Cloud Computing
authorization
authentication
biblio
Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
machine learning methods
integrated circuit modelling
integrated circuit testing
integrated circuits
Inverters
ip protection
IP/IC providers
learning (artificial intelligence)
Logic gates
machine learning
Integrated circuit modeling
Metrics
minimal design variations
modified netlist
pubcrawl
resilience
side-channel power analysis
supply chains
Trojan horses
fingerprinting scheme
policy-based governance
composability
IP piracy
Benchmark testing
circuit CAD
Computer crime
Cryptography
design-based fingerprinting
Fingerprinting
Resiliency
gate-level netlist changes
Hardware
Human behavior
Human Factors
IC design flow
IC piracy
industrial property
integrated circuit design
biblio
A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
hidden access policy
unauthorized data access
storage management
specified access control
Scalability
Public key
pubcrawl
policy-based governance
Organizations
Logic gates
key delegation
hidden access structure
Access Control
Generators
flexible secure key delegation mechanism
fine grained access control
encryption
Cryptography
CP-ABE schemes
CP-ABE
collaboration
ciphertext policy attribute
authorisation
anonymity
biblio
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
NIST curves
IoT-connected healthcare system
key policy attribute based encryption
Key Policy Attribute Based Encryption (KP-ABE)
key-policy
KP-ABE
Lightweight
lightweight key-policy attribute-based encryption scheme
Logic gates
Internet of Things (IoT)
policy-based governance
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
selective-set model
smart phones
delegation feature
Attribute-based
biomedical communication
Chosen-plaintext attack
ciphertext indistinguishability
collaboration
computer network security
cryptanalysis
decryption key
Android phone
encryption
fixed KP-ABE scheme
H-KP-ABE
health care
hierarchical
hierarchical KP-ABE
Internet of Things
biblio
Adding Cyberattacks To An Industry-Leading CAN Simulator
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
communication bus
controller area network security
cyberattacks
controller area networks
attack prevention systems
automotive cyber-security
automotive cybersecurity
CAN simulator
car
controller area network
conformance testing
cyber vulnerability
data usage
in-vehicle network
performance critical components
representative attack demonstrations
safety critical components
automobiles
Attack detection
Logic gates
safety-critical software
simulation
Intrusion Detection
testing
Roads
pubcrawl
Resiliency
cyber-physical systems
telecommunication security
Internet of Things
traffic engineering computing
security of data
Automotive engineering
biblio
A gateway to easily integrate simulation platforms for co-simulation of cyber-physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
pubcrawl
Java
Large-scale systems
Libraries
Logic gates
Metrics
National Institute of Standards and Technology co-simulation platform
NIST co-simulation platform
Object oriented modeling
interacting physical components
Research Infrastructure
resilience
Resiliency
simulations
Software Architecture
standards
Universal CPS Environment
CPS modeling
high-level architecture standard
high level architecture
functional mock-up interface
distributed simulation
distributed processing
digital simulation
cyber-physical systems
CPS conceptual design
computer architecture
Computational modeling
composability
communication libraries
co-simulation expertise
co-simulation
simulation
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
network threats
user privacy in the cloud
privacy-preserving Sharing
privacy-preserving means
privacy preserving
privacy exposure
cyber threat management
Cyber Threat Information
CTI data
Confidential Information Sharing and Analysis for Cyber Protection
Collaborative sharing
collaborative analysis
C3ISP Framework
attack prediction
API Gateway
data sharing
security of data
information management
data sources
Portals
internetworking
application program interfaces
Scalability
Logic gates
collaboration
cyber-attacks
Metrics
pubcrawl
Resiliency
security
data privacy
Cloud Computing
biblio
Resident Evil: Understanding Residential IP Proxy as a Dark Service
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
residential-ip
malware hosting
Malware-and-unwanted-software
Network-and-systems-security
proxy hosts
pubcrawl
resident evil
residential IP proxy
residential networks
residential proxy
Logic gates
residential-IP-proxy-as-a-service
residential-proxy
RESIP IP
Security-and-privacy-for-the-Internet-of-Things
server- side
Servers
underground business world
web-proxy
emerging Internet business
Companies
compromised hosts
Computer crime
computer network security
dark service
dark web
elusive gray services
Embedded-systems-security
anonymity
engineered RESIP services
Human behavior
Human Factors
illicit operations RESIP hosts
internet
Internet service
invasive software
IP networks
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »