Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security attacks
biblio
Multiple Security Threats with Its Solution in Internet of Things (IoT)
Submitted by aekwall on Fri, 09/30/2022 - 1:46pm
composability
the System model of IoT
smart technologies
security attacks
Power engineering
IoT security
Firewalls (computing)
attacks
Industries
security
Human behavior
Resiliency
Metrics
pubcrawl
real-time systems
performance evaluation
IoT
Organizations
biblio
Threats and Attacks to Modern Vehicles
Submitted by grigby1 on Thu, 06/09/2022 - 8:12am
Metrics
internet of vehicles security
security countermeasures.
modern vehicles
autonomous car
cyber physical systems
Human Factors
sensor fusion
automobiles
Roads
Internet of Things
Internet of Vehicles
Safety
security attacks
Resiliency
resilience
Human behavior
pubcrawl
security
machine learning
biblio
A Study on Security Attacks in Wireless Sensor Network
Submitted by grigby1 on Tue, 03/01/2022 - 3:34pm
sensor security
Computer hacking
machine learning
Network Security Architecture
pubcrawl
resilience
Resiliency
security
security attacks
Task Analysis
Weather forecasting
Wireless communication
wireless sensor networks
biblio
Attack Detection on the Software Defined Networking Switches
Submitted by grigby1 on Thu, 09/30/2021 - 1:37pm
computer architecture
Monitoring
Network Security Architecture
pubcrawl
resilience
Resiliency
security
security application
security attacks
Software
Software Defined Networking (SDN) Security
Switches
Switch Security
Task Analysis
biblio
Implementation of a Methodology for Detection and Prevention of Security Attacks in Vehicular Adhoc Networks
Submitted by grigby1 on Wed, 09/08/2021 - 8:35am
Reliability
vehicular ad hoc networks
VANETs
Sybille Attack
SUMO
security attacks
security
Roads
Resiliency
resilience
replay attacks
composability
pubcrawl
Prediction algorithms
NS3
network architecture
Metrics
Human behavior
DSR protocol
denial-of-service attack
DDoS Attack Prevention
biblio
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Submitted by aekwall on Tue, 03/09/2021 - 11:38am
Resiliency
telecommunication security
security attacks
Scalability
Routing protocols
Routing attack
router
route disclosure procedure
robotics mobile ad-hoc networks
Robotics MANETs
robotics MANET environment
MANET Attack Detection
removal mechanisms
pubcrawl
mobile ad hoc networks
malicious station attack
Black hole attacks
black hole attack detection mechanisms
BH finding
BH attack
AODV routing protocol
Ad-hoc On-demand Distance Vector
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 11:42am
SDN infrastructure
Network Security Architecture
networking arena
Performance analysis
policy-based approach
Policy-based Security Architecture
pubcrawl
resilience
SDN based enterprise networks
network devices
SDN security
secure SDN
security attacks
security measures
security policies
software defined networking
telecommunication security
Dynamical Systems
network attacks
Metrics
Enterprise Network Security
dynamic policy framework
dynamic policy enhanced integrated security architecture
dynamic networks
dynamic changes
different security mechanisms
computer network security
computer network management
business communication
authorisation
composability
Predictive Metrics
Resiliency
biblio
Challenges in ROS Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
robot hack acquistion
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
peer to peer application
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
Human behavior
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
availability attacks
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:09am
MultiLayer Perceptron neural network
wireless sensor networks
vehicular ad hoc networks
Vehicle to Vehicle communication
VANET
V2V communication
telecommunication security
telecommunication computing
sensors
security attacks
Roads
Resiliency
resilience
pubcrawl
multilayer perceptrons
Accidents
Multilayer Perceptron
MLP
Metrics
IoV network
Intrusion Detection
Internet of vehicles network
Internet of Vehicles (IoV)
Internet of Vehicles
Human Factors
embedded systems
distributed processing
distributed intrusion detection system
Ad hoc networks
1
2
3
4
5
next ›
last »