Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication networks
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree
biblio
Enforcement of global security policies in federated cloud networks with virtual network functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
VNF
virtualisation
virtual network function
Virtual machining
untrusted cloud
Trusted Computing
system architecture
Software Architecture
service function chaining API
security policies
security of data
pubcrawl
policy-based governance
application program interfaces
OpenStack cloud platform
network security function
network function virtualization
IP networks
Government
Governance
global security policy enforcement
federated cloud network
encryption
Communication networks
collaboration
Cloud Computing
biblio
Network security intrusion detection system based on incremental improved convolutional neural network model
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
intrusion behavior testing
system detection
security of data
Resiliency
pubcrawl
pretreatment
policy-based governance
Policy
Neurons
neural network
neural nets
network security
intrusion detection system
Intrusion Detection
artificial neural network
intrusion behavior detection
Government
Governance
feature extraction
detecting system
data analysis
data acquisition
convolutional neural network
convolution
Computers
Communication networks
collaboration
Artificial Neural Networks
file
Differential Privacy in Linear Distributed Control Systems Entropy Minimizing Mechanisms and Performance Tradeoffs
Submitted by awhitesell on Fri, 04/21/2017 - 12:55pm
Science of Security
Communication networks
decision/estimation theory
differential privacy
distributed algorithms/control
NSA SoS Lablets Materials
Science of Security
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
UIUC
UIUC
NSA SoS Lablets Materials
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance Tradeoffs
Submitted by awhitesell on Fri, 04/21/2017 - 12:51pm
Science of Security
Communication networks
decision/estimation theory
differential privacy
distributed algorithms/control
NSA SoS Lablets Materials
Science of Security
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
UIUC
UIUC
NSA SoS Lablets Materials
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
IP networks
target services
Servers
Resiliency
Relays
pubcrawl
proxy-based architectures
proxy harvesting attack
Network reconnaissance
moving target defense approach
malicious client isolation
malicious client discovery
attacker reconnaissance effort
high-profile targets
end users
distributed denial of service attacks
DDoS attack mitigation
Conferences
computer network security
Computer crime
Communication networks
client-to-proxy assignment strategy
client shuffling
client remapping
biblio
Toward the future of internet architecture for IoE: Precedent research on evolving the identifier and locator separation schemes
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
Internet connected devices
scalability issues
Scalability
Routing
Resiliency
pubcrawl
Protocols
Policy
Metrics
IP networks
Internet of Things
Internet of Everything
clean slate
internet
identifier and locator separation
Human behavior
Hip
future of Internet architecture
evolving Internet architectures
evolution of Internet
computer architecture
Communication networks
collaboration
biblio
Neighborhood area network security in smart grid using security enhanced key updating
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
simple one-way hash function based scheme
PCL
power system security
process analysis toolkit
protocol composition logic
Protocols
pubcrawl170109
SAE protocols
security attacks
security enhanced key updating
PAT
simultaneous authentication of equals protocols
Smart Grid
smart grid infrastructure
Smart Grids
smart power grids
telecommunication security
wireless mesh networks
WMNs
EMSA protocol
Communication networks
Computer crime
Cryptographic Protocols
cyber-attacks
denial of service attack
DoS attack
efficient mesh security association protocols
EMSA
authentication
EMSA protocols
IEEE 802.11s
key refreshment strategy
Logic gates
mesh key holder security handshake
MKHSH
NAN
neighborhood area network security
biblio
MLDED: Multi-layer Data Exfiltration Detection System
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
forensic readiness data exfiltration system
tuning
standards
sensitive data exfiltration detection
security
pubcrawl170109
plain ASCII text
PDF files
Organizations
organization information system
multilayer data exfiltration detection system
MLDED system
keyword labeling
keyword extraction
information protection strategy
Algorithm design and analysis
Digital Forensics
data theft
data loss
data leakage threats
data leakage
data hiding
Data Exfiltration
Data Breach
Cryptography
crime ware services
computer network security
Computer crime
Complexity theory
Communication networks
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »