Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transport protocols
biblio
An overview of cyber-attack vectors on SCADA systems
Submitted by aekwall on Wed, 02/13/2019 - 12:00pm
pubcrawl
transport protocols
TCP/IP based protocols
supervisory control and data acquisition systems
Software
security of data
security
Scalability
SCADA systems
SCADA
Resiliency
Attack vectors
Protocols
Monitoring
Industrial Control Systems
Human behavior
cyber-attack vectors
cyber-attack
critical infrastructures
critical infrastructure
Buffer overflows
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
Servers
NS3 simulation
Probabilistic logic
pubcrawl
re-transition timeout mechanism
resilience
Resiliency
Routing protocols
Scalability
NS-3 Simulation
sigmoid filter optimization
TCP congestion control window algorithm
TCP packet size
telecommunication congestion control
telecommunication traffic
threshold bandwidth filter
transport protocols
attacker traffic
network efficiency
MATLAB
low-rate DoS attack detection
low-rate denial of service attack detection
low-rate bandwidth
Human Factors
honey-pot server
honey pots
high rate attacks
filtering theory
distributed DoS
denial of service (dos)
computer network security
Computer crime
Bandwidth
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
protocol parsing
transport protocols
telecommunication traffic
telecommunication control
stereo depth IDS
semantic analysis
security of data
SD-IDS
Scalability
rule extraction
Resiliency
resilience
pubcrawl
Protocols
deep inspection
period
modbus TCP protocol
Lenses
Intrusion Detection
integrated circuits
Inspection
industrial traffic
industrial network protocol
Industrial Control Systems
industrial control system
industrial control
ICS Anomaly Detection
biblio
The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijack
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
NDN
transport protocols
Topology
telecommunication network routing
Scalability
Routing protocols
Routing Information Base
Routing
Resiliency
resilience
pubcrawl
network topology
network routing
network architecture design
computer network
named data networking
Named Data Network Security
IPv4
IP router
IP networks
IP
Internet Protocol version 4
internet
Human behavior
hijacked node
forwarding plane
data communication
computer network security
biblio
Design and Verification of a Novel IoT Node Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 12:21pm
Ports (Computers)
wireless sensor networks
Verilog
transport protocols
transport protocol
Switches
Servers
pubcrawl
Protocols
protocol verification
privacy
Compositionality
policy-based collaboration
Policy
Microprocessors
IoT node protocol verification
IoT
Internet of Things
intelligent features
Hardware
field programmable gate arrays
dynamic reconfigurable features
biblio
A Secure PMIPv6-Based Group Mobility Scheme for 6L0WPAN Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
IP-based sensing devices
transport protocols
symmetric encryption method
Servers
secure PMIPv6-based group mobility scheme
Resiliency
resilience
pubcrawl
proxy mobile IPv6
Protocols
PMIPv6
personal area networks
mobility management (mobile radio)
low power wireless personal area networks
6L0WPAN
IoT
Internet Protocol version 6
Internet of Things
internet
Handover
Cyber Physical Systems Security
Cryptography
composability
authentication
6LoWPAN group handover scheme
6LoWPAN
6L0WPAN networks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »