Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
networks security
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Thu, 04/30/2015 - 11:54am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection