Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Attack vectors
biblio
XSS Attack Detection With Machine Learning and n-Gram Methods
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
Training data
nearest neighbour methods
Predictive Metrics
pubcrawl
Resiliency
security of data
support vector machine
Support vector machines
SVM
Naive Bayes
Uniform resource locators
vulnerable
Web sites
website
XSS attack
XSS attack detection
XSS attacks
KNN
Bayes methods
composability
cookies
Cross Site Scripting
cross-site scripting
detection script
feature extraction
k-nearest neighbour
Attack vectors
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious script
malicious scripts
N-gram
n-gram method
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
Multi-Attacking Strategy on Smart Grid with Incomplete Network Information
Submitted by grigby1 on Fri, 08/28/2020 - 11:03am
Power measurement
Voltage measurement
telecommunication networks
state estimation
smart power grids
Smart Grid
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system operator
power system
attack vector
power engineering computing
Phasor measurement units
network information technology
multiattacking strategy
Multi-Attack
Load flow
injected false data attack
IEEE 14 bus system
Human behavior
cyber-attacks
Communication networks
Attack vectors
biblio
Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure
Submitted by grigby1 on Fri, 08/28/2020 - 11:03am
IoT
vulnerabilities
vehicular ad hoc networks
vehicle-automotive security
transportation infrastructures
Telematics
smart automobiles
scientific computing
Scalability
road infrastructure
Resiliency
resilience
Relays
pubcrawl
mobile robots
5G mobile communication
Internet of Things
infrastructure attack vectors
Human behavior
fuzzing
Engines
computer network security
computational intelligence
autonomous vehicles
autonomous cars
automotive cybersecurity
automobiles
Attack vectors
attack surface
biblio
Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
mobile ad hoc network
Vectors
telecommunication network routing
Scalability
routing attacks
Routing
risk aware response technique
risk aware response mechanism
risk aware
Resiliency
resilience
pubcrawl
Mobile handsets
mobile devices
mobile ad hoc networks
Aerospace electronics
minimisation
MANET
Intrusion Response
Human behavior
Heuristic algorithms
DSDV algorithm
Dijkstra shortest path algorithm
destination sequenced distance vector algorithm
Destination sequenced Distance Vector
Conferences
computer science
centralized base point
black hole attack minimization
Attack vectors
biblio
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
resilience
insider attacks
Kill Chain
kill-chain approach
kill-chain based method
malicious insider
malicious insiders
Measurement
multiple indirect detection measures
Packet Sniffing
pubcrawl
insider attack
Resiliency
Scalability
security of data
Servers
SIM-card manufacturer Gemalto
Tesla
trees (mathematics)
Undetectable Attacks
virtual machines
Virtual machining
cloud-computing environment
attack tree
attack trees
attack vector
Attack vectors
attack-detection strategies
Aviva Insurance
bank data processing
cloud cluster
Cloud Computing
cloud paradigms
Chained Attacks
cloud-computing services
cloud-service environments
cloud-service providers
combined attack-tree
Companies
Computer crime
Google
Human behavior
Indirect Detection
indirect detection opportunities
biblio
Taxonomy Analysis of Cloud Computing Vulnerabilities through Attack Vector, CVSS and Complexity Parameter
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
CVSS
unified taxonomy
taxonomy
security vulnerabilities
security risks
security of data
Scalability
Resiliency
resilience
pubcrawl
NVD
Human behavior
CVSS score
attack vector
comprehensive taxonomy
complexity parameter
cloud vulnerabilities
cloud specific vulnerabilities
cloud specific identified vulnerabilities
cloud enabled services
cloud computing vulnerabilities
cloud computing system
Cloud Computing
Attack vectors
Attack Vector (AV)
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
security
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
maritime sector
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
AIS
marine navigation
marine communication
legislation
Human behavior
governments
Europe
data quality
conceptual countermeasures
collision avoidance
Coast Guard
automatic identification system
Attack vectors
Artificial Intelligence
AIS networks
AIS data
biblio
Towards Real-Time-Aware Intrusion Tolerance
Submitted by aekwall on Mon, 07/27/2020 - 11:11am
cyber-physical realtime systems
control engineering computing
intrusion tolerance
cyber physical systems
ISO 26262
safety systems
assisted/autonomous driving
automotive use-cases
cyber-physical real-time systems
authentication
EN IEC 62061
EN ISO 13849
functional safety regulations
real-time-aware intrusion tolerance
real-time-aware intrusion-tolerant architectures
safety requirements
security holes
security
Attack vectors
mobile robots
composability
pubcrawl
Resiliency
cyber-physical systems
real-time systems
Protocols
traffic engineering computing
security of data
Safety
road vehicles
road safety
Automotive engineering
automobiles
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »