Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resilience
biblio
Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs
Submitted by grigby1 on Tue, 02/06/2018 - 1:55pm
message authentication
Ubiquitous Computing Security
ubiquitous computing
Support vector machines
Scalability
Resistance
Resiliency
resilience
PUF
pubcrawl
physical unclonable functions
physical unclonable function (PUF)
neural nets
Metrics
Arbiter-PUF
machine-learning
machine learning
low-cost pervasive devices
low-cost authentication
Logic gates
lightweight obfuscation
learning (artificial intelligence)
Human Factors
Human behavior
delays
authentication
Artificial Neural Networks
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
biblio
Designing agility and resilience into embedded systems
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
computer security
high level system properties
Global Positioning System
embedded systems
design for cyber security
cyber-physical systems
cyber security
cyber resilience
CPS
Measurement
best-practice security policies
autonomous aerial vehicles
attacker
attack surface
Assessment
ARES methodology
analytic process guides system developers
adversarial actors
resilience
UAS
Systems architecture
systems analysis
system analysis and design
security of data
RF environment
Resilient Security Architectures
Resiliency
unmanned aerial systems
remotely located communicating devices
pubcrawl
mission success
mission objectives
mission assurance a challenging problem
Mission Assurance
Metrics
metric set
biblio
Threat awareness for critical infrastructures resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
Context
critical infrastructure resilience
critical infrastructures
Data protection
Europe
European utility company
integrated circuits
Market research
pubcrawl
public utilities
resilience
utility network protection
Resilient Security Architectures
security
Security Awareness
security of data
security risk
Smart Grids
social engineering
Software Architecture
threat awareness
threat awareness architecture
biblio
A resilient distributed controller for software defined networking
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
software defined networking
Software
Resilient Security Architectures
resilient distributed controller
Resiliency
resilience
pubcrawl
Proposals
placement optimization
optimization
optimisation
network topology
control systems
control plane distribution
computer architecture
biblio
Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
IoT socio-technical systems
Communities of Interest
computer architecture
Cyber defence
cyber security
digital economy
digital-enabled enterprises
functionality requirement
IA Architecture
Information Assurance
information management
internet
Internet infrastructure developments
Internet of Things
information sharing
Protocols
pubcrawl
resilience
Resiliency
Resilient Security Architectures
risk exposure
security
security of data
sociotechnical systems
STS
Trusted Computing
socio-technical systems
biblio
TTLock: Tenacious and traceless logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
IP piracy
TTLock
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Policy
logic locking
IP piracy revention
collaboration
Interference
intellectual property protection technique
intellectual property
industrial property
Foundries
computer science
Computers
Computer crime
composability
biblio
Towards data assurance and resilience in IoT using blockchain
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
drones
Servers
security scalability
secure communication
Scalability
resilience
Reliability
pubcrawl
integrity
auditing
Drone
Distributed databases
Date Assurance
control systems
computer architecture
blockchain security
blockchain
biblio
Machine learning aided traffic tolerance to improve resilience for software defined networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
SDN
OpenFlow
pattern classification
POX controller platform
Prediction algorithms
pubcrawl
real-time systems
ReSDN
resilience
resilience framework
Resiliency
routing table
network security
SDNs
software defined networking
Software Defined Networks
Survivability
SYN flood
telecommunication network routing
telecommunication traffic
Traffic Management
traffic tolerance
Training
feature extraction
centralised control
centralised controller
composability
computer network management
computer network reliability
computer network security
Decision Making
DoS attack
DoS attacks
Engines
attacks classification
flexible management
Future Internet
intrusion tolerance
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious intrusion detection
Mininet simulator
MIT KDD 1999 dataset
neptune attack
biblio
Meeting the Challenges of Critical and Extreme Dependability and Security
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
intrusion tolerance
ultra-resilient components
Telecommunications
sophisticated targeted attacks
Software
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Advanced and persistent threats
Hardware
fault and intrusion tolerance
extreme security risks
extreme computing
dependability risks
composability
APT
Algorithm design and analysis
advanced persistent threats
« first
‹ previous
…
676
677
678
679
680
681
682
683
684
…
next ›
last »