Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security attacks
biblio
Symmetric-Key Multi-Factor Biometric Authentication Scheme
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
multi-factor
symmetric-key multifactor biometric authentication scheme
smart-card
Silicon
Servers
security attacks
Resiliency
pubcrawl
ProVerif
ProVeri
private key cryptography
password
multifactor authentication
authentication
Metrics
identity password
Human Factors
Germanium
Cryptography
Cao and Ge's scheme
Burrows-Abadi-Needham (BAN) logic
biometrics (access control)
biometric techniques
biometric
authorisation
biblio
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
Internet of Things systems
symmetric-key algorithm
simple round function
security attacks
security and performance analysis
Scalability
Resiliency
Radio frequency
pubcrawl
plaintext messages
Lightweight flexible key dependent cipher scheme
lightweight cryptographic algorithms
Lightweight Ciphers
lightweight cipher scheme
IoT systems
IoT devices
cipher variants
Internet of Things
input message
Heuristic algorithms
flexible lightweight cipher
flexible cipher scheme
dynamic Operation mode
dynamic key approach
dynamic cryptographic primitives
data confidentiality
Cryptography
confidentiality attacks
Conferences
computer network security
Ciphers
biblio
A Middleware Framework to Address Security Issues in Integrated Multisystem Applications
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
open systems
Systems-of-Systems
Systems Integration
smart cities
sensors
security of data
security attacks
security aspects
security
Resiliency
pubcrawl
production engineering computing
Access Control
multisystem integration
middleware
Metrics
manufacturing systems
interoperability
integrated multisystem applications
industrial applications
Human behavior
composability
actuators
actuator security
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobility speeds
Throughput
telecommunication security
single nodes
simple application layer based intrusion detection scheme
security attacks
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
multiple blackhole nodes
application-layer scheme
mobile agents
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
lower layers
Intrusion Detection
effective application layer based intrusion detection scheme
detection mechanism
composability
Blackhole attack
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
Digital Blues: An Investigation Into the Use of Bluetooth Protocols
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
Data collection
bluetooth security
time 1.0 week
Object recognition
mobile devices
digital blues
Bluetooth protocols
Bluetooth mobile device communications
Bluetooth Detection
Bluetooth
encryption
mobile radio
security attacks
Mobile handsets
composability
pubcrawl
Human behavior
Resiliency
Protocols
telecommunication security
« first
‹ previous
1
2
3
4
5
next ›
last »