Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Local area networks
biblio
xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDs
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
Resiliency
malware
Metrics
Network
networking equipment
optical
Optical sensors
optical signals
Protocols
pubcrawl
remote cameras
resilience
malicious code
router LED
security cameras
sensitive information
smart phones
smartphone cameras
status LED
switch LED
telecommunication security
transmission protocol
xLED
Ezfiltration
air-gap
air-gapped network
bit rate 1.0 bit/s
bit rate 2000.0 bit/s
Cameras
composability
Computer crime
covert channel (key words)
covert data exfiltration
covert-channel
Air gaps
hermetic isolation
Human behavior
internet
invasive software
IT network
LAN routers
LAN switches
light emitting diodes
Local area networks
low-level control
biblio
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
SD-card storage manager
Named Data Network Security
open-source designs
pattern classification
program debugging
program verification
pubcrawl
Registers
resilience
Resiliency
robotics controller
Scalability
Local area networks
security
security of data
sequential logic
SIMAREL
specification languages
storage management
STREAMS policies
unbounded input streams
user interfaces
Wires
Ethernet controller
automatically-synthesized relational invariants
circuit executions
core design C
debugging interface
declassification
digital signal processing chips
digital-signal processing module
Domain-Specific Language
DSP module
dynamic conditions
Algorithm design and analysis
field programmable gate arrays
flash memories
flash memory controller
flow security
Hardware
Hardware design languages
Human behavior
human computer interaction
information leaks
information-flow policies
biblio
Cyber Security of Industrial Communication Protocols
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
Metrics
testbed
security weaknesses
security
Resiliency
resilience
pubcrawl
Protocols
programming
PROFINET
Portals
policy-based governance
Monitoring
collaboration
Machinery
Local area networks
integrated circuits
industrial Ethernet
Industrial Control Systems
industrial control
industrial communication protocols
Human Factors
Human behavior
cyber security
computer network security
commercial-off-the-shelf equipment
biblio
Support Vector Machine for Network Intrusion and Cyber-Attack Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
network intrusion
Training
threat vectors
telecommunication traffic
Support vector machines
support vector machine
statistical techniques
statistical analysis
security of data
pubcrawl
privacy
Ports (Computers)
anomaly-based IDS
ML techniques
Metrics
Measurement
machine learning
Local area networks
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
cyber-security threats
cyber-attack detection
biblio
A two-layer network Orchestrator offering trustworthy connectivity to a ROS-industrial application
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
production engineering computing
Trustworthy Systems
trustworthy network
trustworthy connectivity
Trusted Computing
to-end Ethernet flows
Three-dimensional displays
Service robots
ROS-industrial application
ROS-I
ROS
robotic operating system industrial distributed application
Robot sensing systems
Resiliency
Reliability
pubcrawl
composability
orchestrated two-layer network test-bed
Optical fiber networks
operating systems (computers)
network orchestrator
Local area networks
industrial robots
industrial robotics
fiber outage
end-to-end flow services
data transfer
data exchange
cyber physical systems
control engineering computing
computer network security
biblio
Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
IPv6
RTL-based Network Time Protocol v4 synchronization
Resiliency
register transfer level logic
pubcrawl
network-based keyed access
network processor
MT6D
moving target defense over IPv6
moving target defense
modular crypto engine
Metrics
low power wireless personal area networks
Local area networks
IPv6 interfaces
application specific integrated circuits
IP networks
Instruction sets
IEEE 802.3 Standard
IEEE 802.3 Ethernet
FPGA
field programmable gate arrays
EPON
embedded application-specified integrated circuit
Electrical Engineering
Cryptography
Computers
complex instruction set computer instruction set architecture
ASIC
biblio
A symmetric address translation approach for a network layer moving target defense to secure power grid networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
power system security
wide area networks
symmetric packet scheduling rules
symmetric address translation
supervisory control and data acquisition network
supervisory control and data acquisition
Substations
security
scheduling
SCADA systems
SCADA network
SCADA
Resiliency
pubcrawl
computer network security
power grids
power grid network security
Network Address Translation
MTD
moving target defense
Metrics
Logic gates
Local area networks
IP-Hopping
IP networks
Cyber Physical System
critical infrastructure
biblio
PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication
Submitted by grigby1 on Mon, 04/24/2017 - 11:39am
anonymity
anonymity in wireless networks
anonymous communication
composability
controller area network security
dining cryptographers networks
Human behavior
Local area networks
Metrics
pubcrawl
Resiliency
traffic analysis resistance
biblio
Practical DCB for improved data center networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
NIC
Vegetation
transport protocols
Topology
Throughput
telecommunication traffic
telecommunication network topology
TCP-bolt
System recovery
switching networks
storage area networking
Routing protocols
Routing
Ports (Computers)
arbitrary network topology traffic
lossless Ethernet
Local area networks
line blocking head
improved data center network
Hardware
ECMP routing
deadlock-free routing scheme
DCB
data center bridging
computer centres
commodity data center switch
buffering delay
biblio
Software tool for verification of sampled values transmitted via IEC 61850-9-2 protocol
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
power engineering computing
system buses
Substations
substation protection
substation
software tool
software protection system
sampled values
Protocols
process bus
Current measurement
merging
Local area networks
IEC standards
IEC 61850-9-2 protocol
GOOSE messages
Ethernet
Decoding
Data visualization
« first
‹ previous
1
2
3
4
next ›
last »