Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication networks
biblio
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
resilience
Virtualization
virtualisation
virtual security function
software-defined networking
software defined networking
smart power grids
Smart Grids
Servers
security function virtualization
security
SDN-enabled smart grid
SDN security
Scalability
Resiliency
Bandwidth
pubcrawl
power system security
power engineering computing
nonlinear programming
moving target defense
Monitoring
Metrics
integer programming
integer nonlinear programming problem
dynamic defense methods
computer network security
Communication networks
centralized SDN controller
biblio
Virtual Network Mapping Algorithm for Self-Healing of Distribution Network
Submitted by grigby1 on Mon, 02/17/2020 - 5:15pm
survivability virtual network initial mapping method
power systems
pubcrawl
remapping efficiency
remapping method
resilience
Resiliency
self-healing
self-healing networks
power engineering computing
SVNE method
virtual links
virtual network
virtual network mapping algorithm
virtual nodes
virtualisation
VN initial mapping method
automation
power distribution reliability
physical node recoverability
optical fiber communication
node failure
network mapping
multinode failures
Linear programming
fault tolerant computing
distribution network
composability
Companies
Communication networks
backup resource-specific phenomenon
backup overhead
backup mechanism
biblio
Research on Self-Healing Technology for Faults of Intelligent Distribution Network Communication System
Submitted by grigby1 on Mon, 02/17/2020 - 5:13pm
power distribution control
smart power service
Smart Grids
SHC
self-healing technology
self-healing networks
self-healing control
Resiliency
resilience
Real-time monitoring
pubcrawl
power system security
power system
power grids
power engineering computing
power distribution faults
Business
optimal control
Monitoring
maintenance engineering
intelligent power communication network
intelligent distribution network communication system faults
intelligent decision
distribution network self-healing control
distribution network data monitoring
Data Transmission
data analysis
computerised monitoring
composability
Communication networks
Circuit faults
biblio
Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
formal verification
static detection method
smali abstract syntax tree
rule matching
mobile-application
mobile application market
malicious application flooding
local denial of service vulnerability detection technology
hook verification
dynamic detection method
-static-detection
-security-vulnerability
-rule-matching
-dynamic-detection
Computer crashes
Monitoring
Compositionality
smart phones
vulnerability detection
Communication networks
Mobile Applications
pattern matching
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
security
biblio
Web-Based Platform for Evaluation of Resilient and Transactive Smart-Grids
Submitted by aekwall on Mon, 02/10/2020 - 12:05pm
physical components
computational components
DER
design studio
distributed sensors
economic control techniques
energy generation
energy generators
energy transmission
grid reliability
grid resilience
largely open IP-based communication network
comprehensive Web-based platform
physical-attacks
power-grid security
Power-grid simulation
remote cyber-attacks
smart-grids
software-controlled grid operations
TE approach
transactive energy
transactive smart-grids
Smart Grid Sensors
Communication networks
modeling and simulation
Resiliency
pubcrawl
internet
Reliability
Attack vectors
smart power grids
distributed energy resources
power engineering computing
Smart Grids
security of data
Load modeling
power system reliability
resilience
distributed power generation
Human Factors
Energy storage
Compositionality
storage devices
Meters
collaboration platform
biblio
Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Networked Control Systems Security
water power generation industrial control network
smart power grids
Servers
security risk control
security
Scalability
Resiliency
resilience
pubcrawl
Predictive Metrics
Protocols
power system security
power engineering computing
open network
network security problems
attack and defense map
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control network system
industrial control
hydroelectric power stations
Hydroelectric power generation
Hazards
future hydroelectric power generation system
defense strategy
dedicated network
Databases
computer network security
composability
Communication networks
biblio
A Construction Method of Security Mechanism Requirement for Wireless Access System Based on CC Standard
Submitted by grigby1 on Tue, 01/21/2020 - 11:33am
Safety
Wireless communication
wireless access system
telecommunication security
standards
security threats
security mechanism requirement construction method
security functions
security functional components
security evaluation standard
security assurance components
Security Assurance
Security Assessment Standards
security
Scalability
collaboration
Resiliency
resilience
radio access networks
pubcrawl
policy-based governance
Metrics
information technology
Information Assurance
incomplete security mechanism
Human behavior
emergency communication network
composability
Communication system security
Communication networks
biblio
Towards probabilistic identification of zero-day attack paths
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
Predictive Metrics
Zero Day Attacks and Defense
zero-day attack paths
ZePro
sockets
probabilistic identification
object instance graph
intrusion propagation
enterprise network security defense
Bayesian network
belief networks
computer network security
Communication networks
probability
Probabilistic logic
composability
pubcrawl
Resiliency
feature extraction
Bayes methods
security
Conferences
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
Securing Industrial Wireless Networks: Enhancing SDN with PhySec
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
industrial landscape
sensors
software defined networking
network management
physical layer security
additional overhead
cryptographic procedures
cyber-physical production systems
cyber-security threats
industrial communication networks
network security
industrial wireless networks
interconnected devices
network security requirements
PhySec
secret key generation
transmission bandwidth
wireless solutions
actuator security
Communication system security
Cryptography
Internet of Things
Software
computer network management
Resiliency
Human behavior
pubcrawl
composability
computer network security
Wireless communication
Metrics
production engineering computing
software-defined networking
SDN
Communication networks
cyber security
radio networks
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »