Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Inspection
biblio
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IIoT devices
typical IoT devices
security bootstrapping
Scalability
Resiliency
resilience
pubcrawl
Production facilities
performance evaluation
Payloads
manual device configuration
intranets
Internet of Things devices
Internet of Things
Inspection
industrial enterprise networks
authorisation
enterprise management
DPI-enabled intranets
DPI proxy certificate authority certificates
DPI proxy CA
DPI policies
deep packet inspection proxies
deep packet inspection
Cryptography
conventional computing devices
computer network security
computer bootstrapping
chicken-and-egg problem
certification
bootstrapping security configuration
biblio
Markov Augmented Neural Networks for Streaming Video Classification
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
Markov processes
video streaming services
video streaming
video signal processing
telecommunication traffic
streaming video classification
Scalability
Resiliency
resilience
pubcrawl
port scanning
Neural networks
neural nets
content providers
Markov Decision Process
Markov augmented neural networks
machine learning
IP networks
IP addresses
internet providers
internet
Inspection
image classification
deep packet inspection techniques
deep packet inspection
decision theory
biblio
Cybercrime Countermeasure of Insider Threat Investigation
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
DPI method
Scalability
Resiliency
resilience
pubcrawl
Organizations
Online banking
law enforcement
Inspection
insider threat investigation
insider threat
Big Data
digital investigation process
digital evidence
deep packet inspection methods
deep packet inspection
cybercrime threats
cybercrime investigation
cybercrime insider investigation
cybercrime countermeasure
Computer crime
biblio
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
deep packet inspection
feature extraction
Forestry
Inspection
Mathematical model
optimization
Protocols
pubcrawl
resilience
Resiliency
Scalability
supervised learning
biblio
Deep Packet Inspection Through Virtual Platforms using System-On-Chip FPGAs
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
resilience
virtual platforms
virtual platform
transaction level modeling
TLM
time-varying systems
time-domain analysis
system-on-chip FPGA
system-on-chip
system on chip
Software
search engines
Scalability
Resiliency
computer architecture
pubcrawl
Mentor Vista
logic design
Inspection
hybrid CPU/FPGA
hardware-IP based architecture
hardware accelerators
Hardware
field programmable gate arrays
ESL
deep packet inspection
CPU-DMA based architecture
biblio
Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
machine learning method
Training
telecommunication traffic
Scalability
Resiliency
resilience
quality of user service
pubcrawl
probability
Peer-to-peer computing
pattern matching
network traffic monitoring
network traffic identification method
network traffic identification
application traffic
machine learning algorithms
machine learning
learning (artificial intelligence)
Inspection
encryption
dpi
deep packet inspection technology
deep packet inspection
data analysis
Cryptography
computer network security
computer network management
biblio
An architecture to manage security services for cloud applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Software
management practice
network services
operation models
Security architectures
security orchestrator
security perimeter
security services
service orchestration
Inspection
software orchestration
Topology
ubiquitous computing
virtual functions
Virtualization
Pervasive Computing Security
Human Factors
security
cyber-security paradigms
cyber-security architecture
cloud-based distributed applications
cloud technologies
cloud application
Human behavior
resilience
Resiliency
Metrics
pubcrawl
computer architecture
Scalability
Monitoring
Cloud Computing
security of data
biblio
Secure Integration of Electric Vehicles with the Power Grid
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
power data
cyber-physical
cyber-physical anomaly detection Engine
detects anomalies
distribution networks
EV
monitoring cyber messages
monitors system behavior
pluggable electric vehicles
critical power grid component
power grid system
Power measurement
power measurements
V2G cyber network
Vehicle-to-grid
vehicle-to-grid system
worst case inspection time
Smart Grid Sensors
Inspection
Monitoring
security
Resiliency
pubcrawl
Protocols
Anomaly Detection
distributed energy resources
power system security
Intrusion Detection
distributed power generation
secure integration
Engines
Human Factors
Compositionality
Electric Vehicles
aggregator
battery powered vehicles
biblio
Vulnerability and Protocol Association of Device Firmware in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:42pm
Metrics
vulnerability information correlation
vulnerability association
security vulnerability
Safety
Resiliency
resilience
pubcrawl
Protocols
protocol association
power system security
power system control
power grids
power grid vulnerability analysis
composability
mass grid device firmware device attributes
intelligent power grid
Inspection
industrial power systems
industrial control system device firmware
industrial control equipment safety inspection
industrial control device firmware protocol vulnerabilities
industrial control
firmware preprocessing
firmware
features extraction
Control equipment
biblio
Detection of Temporal Data Ex-Filtration Threats to Relational Databases
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Training
temporal data ex-filtration threat detection
Temporal Attacks
Insider Threats
Data Analytics for Security
anomaly detection techniques
anomalous access detection
relational database security
unauthorized access
relational databases
data theft
Anomaly Detection
Inspection
query processing
Metrics
composability
pubcrawl
Human behavior
Resiliency
feature extraction
real-time systems
authorisation
Monitoring
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »