Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security architecture
biblio
Profiling of secure chat and calling apps from encrypted traffic
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
nonreadable contents
ios
android
chat and voice/ video app
chat apps
cryptograhically secure sessions
encrypted traffic
iOS mobile platform
network forensic
Windows
secure app
secure chat profiling
service provider networks
voice/ video apps
voice/ video calling apps
voice/ video calls
iOS Security
internet
Cryptography
Protocols
Trusted Computing
mobile computing
Resiliency
pubcrawl
Social network services
Metrics
Servers
Forensics
Data mining
security architecture
Human Factors
Android (operating system)
confidentiality
Compositionality
biblio
An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
security event database
intelligent defense
Network Security Architecture
pubcrawl
Resiliency
resource allocation
security
security architecture
security capability pool
security decision center
intelligent cyberspace defense architecture
security load
security of data
security payload
security resource allocation
Software
top-level security framework
unprecedented hard situation
versatile cyberspace
containerization technology
Metrics
Dynamic Networks and Security
aggregated security events
Cloud Computing
cloud computing platform
computer architecture
container library
containerization
composability
Containers
Cyberspace
decision rule base
dynamic container orchestration
Dynamic decision making
Dynamical Systems
elastic resource infrastructure
Hardware
biblio
A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
architectural design
structural design
security architecture framework
security architecture
security architectural framework
secured information systems
ring-based nested network zones
Nested Zones
N-tier/shared nothing system architectures
defense-in-depth approach
defense in depth
data centers
critical infrastructure
Attack Hops
security of data
network architecture
Network Security Architecture
critical information infrastructure
Guidelines
security attributes
Information systems
Software Architecture
standards
pubcrawl
Resiliency
computer architecture
security
biblio
The Research on IOT Security Architecture and Its Key Technologies
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
information processing
scientific information technology
IoT security architecture
information security system
information industry
economic development
Network Security Architecture
WSN
RFID
radiofrequency identification
security of data
security threats
security architecture
pubcrawl
Resiliency
information security
computer architecture
Internet of Things
technological development
biblio
RFID-assisted Continuous User Authentication for IoT-based Smart Farming
Submitted by aekwall on Mon, 03/23/2020 - 1:32pm
machine data
agricultural contractors
agricultural machines
collaborative agricultural processes
farm management information systems
farm-internal interconnection
FMIS
in-field data exchange
interconnected machinery
IoT-based smart Farming
electronic data interchange
Machinery
Management information systems
NFC
Radio Frequency Identification-based continuous user authentication
RFID-assisted continuous user authentication
Smart Farming
sustainable resource management
RFIDs
authentication
authorization
Internet of Things
security
Resiliency
Human behavior
pubcrawl
Business
sustainable development
Servers
public domain software
message authentication
security architecture
radiofrequency identification
RFID
Agriculture
groupware
Decision support systems
biblio
Smart Grid Cyber Security and Substation Network Security
Submitted by grigby1 on Mon, 03/09/2020 - 2:56pm
Smart Grid Cyber Security
NIST interoperability framework process
personnel training
policy-based governance
power system security
power system simulation
pubcrawl
resilience
Resiliency
Scalability
security architecture
Metrics
Smart Grid Privacy
smart grid-related data privacy
Smart Grids
smart power grids
standards
substation network security
substation protection
Substations
ZigBee Smart Energy
Data Minimization
Advanced Metering Infrastructure (AMI)
Advanced Security Acceleration Project for the Smart Grid
Automated Data Exchange (ADE)
collaboration
composability
computer security
consumer privacy
consumer privacy audits
cyber security controls
cyber vulnerability assessments
(ASP-SG)
data privacy
Data Security
Demand Response and Smart Grid Coalition (DRSG)
electric power infrastructure
Home Area Network (HAN)
Human behavior
Human Factors
IP Security (IPSec)
Law
biblio
New security architecture using hybrid IDS for virtual private clouds
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
learning (artificial intelligence)
virtual private clouds
virtual private cloud
virtual machines
virtual machine security
virtual machine
telecommunication traffic
security architecture
private cloud environments
privacy vulnerability
neural nets
network-based intrusion detection system
network-based IDS
network security
Malicious Traffic
machine learning
IDS
intrusion detection system
IDS based ANN
hybrid Intrusion Detection System
hybrid IDS
host-based intrusion detection system
digital transformation
digital revolution
detection engine
data privacy
cyber-attacks
computer network security
Cloud Computing
artificial neural network
anomalies detection
pubcrawl
biblio
A Security Architecture for RISC-V based IoT Devices
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
small and medium-sized enterprises
RISC-V
RISC-V based IoT devices
RISC-V ISA
Scalability
scalable computing subsystem
Scalable Security
Secure Boot
secure deployment
security architecture
security concept
SIP
Resiliency
small-to-medium enterprises
SME
Software
strict power constraints
system-in-package
system-on-chip
three dimensional system-in-package
Universal Sensor Platform SoC
USeP SoC
watchdog timer
Internet of Things
authenticated watchdog timer
automation
composability
core security features
Cryptography
customizable Internet of Things platform
Device Security
embedded devices
Fraunhofer Institutes
Hardware
3D-SiP
IoT
IoT applications
IoT market
medium security level
Microelectronics Security
Monitoring
p
Predictive Metrics
pubcrawl
reduced instruction set computing
biblio
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
security policy implementation
expensive steps
flexible infrastructure IP
functional design flow
illustrative policies
industrial SoC
integrated circuit design
modern SoC design validation
off-the-shelf formal tools
Security Engine
efficient formal verification
simulation-based security verification
SoC Security
SoC security policies
SoC Verification
streamlined verification
system-level security policies
verification time
verification tools
Security Policies Analysis
Engines
Monitoring
IP networks
system-on-chip
pubcrawl
policy-based governance
Cryptography
tools
security architecture
Complexity theory
security of data
security policy
formal verification
alternative architecture
artifact
CAD
CAD flow
centralized infrastructure IP
complex steps
critical steps
biblio
A Unified Cybersecurity Framework for Complex Environments
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
Scalability
Resiliency
Cybersecurity
security architecture
pubcrawl
Cloud Security
case study
integrated capability management
Information Centric Networks
« first
‹ previous
1
2
3
next ›
last »