Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Inspection
biblio
Binding the Physical and Cyber Worlds: A Blockchain Approach for Cargo Supply Chain Security Enhancement
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
international trade
U.S.
Transportation
terrorist attacks
Terrorism
supply chains
supply chain stakeholders
supply chain management
security of data
security
securing cargo transportation
Public key
pubcrawl
physical cargo movements
maritime transportation
maritime cargo tracking system
binding scheme
Inspection
information management
illicit activities
goods distribution
globalisation
global economies
freight handling
digital identity management mechanism maps
cyber world
Companies
cargo supply chain security enhancement
cargo inspection
blockchain-based cargo management system
blockchain security
blockchain
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
A prototype model development for classification of material using acoustic resonance spectroscopy
Submitted by grigby1 on Mon, 12/10/2018 - 11:36am
transducer holder physical coupling
Piezoelectric transducer
piezoelectric transducers
prototype model development
pubcrawl
Real time acquisition system
recorded signals
resilience
Resiliency
Resonant frequency
Scalability
Spectroscopy
pick up transducer
Transducers
transmitted signal
transmitter
ultrasonic materials testing
ultrasonic transducers
V-shaped glass rod
Vibrations
water-salt samples
water-sugar samples
White noise
white noise generator
data acquisition
acoustic noise
acoustic resonance
acoustic resonance spectroscopy
Acoustic resonance spectroscopy (ARS)
Acoustic signal processing
acoustic signature
Acoustics
ceramic coated piezoelectric transducers
ceramics
constituent identification
cyber-physical systems
acoustic coupling
defective pills
fast Fourier transforms
FFT
Glass
Human behavior
Inspection
inspection methods
Liquids
material classification
measurement system
offline analysis
biblio
System architecture for deep packet inspection in high-speed networks
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
PeerDirect
graphics processing units
Hardware
hardware tools
hardware-software solution
high-speed networks
Inspection
Mellanox
Napatech
Nvidia
graphics processing unit
pubcrawl
real-time data analysis
resilience
Resiliency
Scalability
software requirements
system architecture
Zero-copy
data communication
Central Processing Unit
computer architecture
computer network
computer network security
computing devices
CPU
CUDA
data analysis
bit rate 80.0 Gbit/s
data transmission networks
data volume real-time processing
deep packet inspection
DMA
DPDK
dpi
firewall
GPUDirect
biblio
Programmable SoC platform for deep packet inspection using enhanced Boyer-Moore algorithm
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
SIMD
Program processors
Programmable SoC
pubcrawl
real-time on-line pattern search
real-time systems
resilience
Resiliency
Scalability
search problems
platform based design methodologies
string matching
system monitoring
system-on-chip
SystemC
TCP
TCP packets
Xilinx Zynq programmable SoC
Zynq
High-Le'vel Synthesis
Algorithm design and analysis
BM string search algorithm
Boyer-Moore
Boyer-Moore algorithm
computer network security
deep packet inspection
FPGA
Hardware
high level synthesis
Accelerator
high-level synthesis
Inspection
MISD parallelism
Network Monitoring
network security
parallel processing
Payloads
Platform Based Design
biblio
Deep packet inspection using Cuckoo filter
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
matched filters
Traffic identification
Traffic classification
telecommunication traffic
signature fingerprint
Scalability
Resiliency
resilience
Quotient Filter
pubcrawl
membership query data structures
matching check tool
Bloom filter
k hash functions
Internet service providers
internet
Inspection
Information filters
high performance DPI approaches
Fingerprint recognition
filtering algorithms
deep packet inspection
data structures
Cuckoo filter
biblio
Deep packet inspection Management application in SDN
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
resilience
JSON-Java Script Object Notation
nonrelational data base
north-bound application
Open vSwitch-Open Virtual Switch
pubcrawl
QoS-Quality of Service
quality of service
real-time systems
JSON format
Resiliency
Scalability
SDN architecture
SDN-Software Defined Networking
SNMP trap notifications
software defined networking
Switches
application signature data analysis
Inspection
flow provisioning behavior
Engines
DPI-Deep Packet Inspection
DPI management application
digital signatures
deep packet inspection management
deep packet inspection
Databases
data representation
data flows
data analytic engine
data analysis
computer network security
application threshold
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by grigby1 on Thu, 08/23/2018 - 11:36am
security risks
automotive
automotive electronics
automotive applications
Bluetooth
Bluetooth connectivity
bluetooth security
Bluetooth-enabled systems
composability
Cybersecurity
Resiliency
Safety
Roads
security
wireless interfaces
telecommunication security
Human behavior
human factor
infotainment
Inspection
malicious attacks
on-board communications
Pins
pubcrawl
resilience
threat intelligence
war-nibbling
biblio
Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
protocol parsing
transport protocols
telecommunication traffic
telecommunication control
stereo depth IDS
semantic analysis
security of data
SD-IDS
Scalability
rule extraction
Resiliency
resilience
pubcrawl
Protocols
deep inspection
period
modbus TCP protocol
Lenses
Intrusion Detection
integrated circuits
Inspection
industrial traffic
industrial network protocol
Industrial Control Systems
industrial control system
industrial control
ICS Anomaly Detection
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »