Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
firewalls
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chains
security chain verification
security functions
model checking
smart devices
SMT
software-defined networking
software defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 10:39am
NAT overflow attack
IPv6 middlebox
ipv6 security
Logic gates
Metrics
Middlebox
middlebox security problems
Middleboxes
Mobile handsets
NAT bricking attack
IPv6 cellular networks
NAT resources
NAT wiping attack
over-billing attacks
pubcrawl
Resiliency
security
stateful NAT64 boxes
TCP sequence number verification
telecommunication services
denial-of-service attacks
backward compatibility
cellular devices
cellular middleboxes
cellular network
Cellular networks
cellular operators
cellular radio
collaboration
composability
active NAT mappings
firewalls
IP address
IP networks
IP-based blacklisting
IPv4 address
IPv4 services
IPv6
IPv6 address
biblio
A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:26pm
Firewalls (computing)
smart power grids
Smart Grids
smart grid AMI networks
Servers
Resiliency
pubcrawl
power system security
power meters
Metrics
Infrastructure as a Service (IaaS)
Human behavior
Grid Openflow firewall (GOF)
advanced metering infrastructure
firewalls
Distributed Denial of Service (DDoS)
distributed denial of service
DDoS Attacks
DDoS attack mitigation
Computer crime
composability
cloud-based openflow firewall
cloud computing technology
Cloud Computing
Bandwidth
Advanced Metering Infrastructure (AMI)
biblio
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Firewalls (computing)
Shadow mapping
security policy query engine
security policies
radically disjunctive approach
query processing
pubcrawl
policy-based governance
Policy
Government
Governance
FPQE
anomaly resolution
firewalls
firewall rules
firewall configuration
firewall anomalies
Explosions
Engines
Electronic mail
Correlation
correction process
collaboration
biblio
SplitBox: Toward Efficient Private Network Function Virtualization
Submitted by grigby1 on Tue, 09/19/2017 - 11:11am
firewalls
Metrics
Middlebox Privacy
network function virtualization
pubcrawl
Resiliency
Router Systems Security
secret sharing
biblio
Detecting Insider Attacks with Video Websites Using Distributed Image Steganalysis (Abstract Only)
Submitted by grigby1 on Fri, 08/18/2017 - 1:11pm
composability
firewalls
insider exfiltration
Metrics
online video
privacy
pubcrawl
security and privacy
steganography detection
video steganalysis
video steganography
biblio
SplitBox: Toward Efficient Private Network Function Virtualization
Submitted by grigby1 on Wed, 08/02/2017 - 12:57pm
composability
firewalls
Human behavior
Metrics
Middlebox Privacy
network function virtualization
privacy
pubcrawl
Resiliency
secret sharing
virtualization privacy
biblio
Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports
Submitted by grigby1 on Tue, 05/16/2017 - 11:26am
application protocols
composability
deep packet inspection
firewalls
Metrics
pubcrawl
Scalability
Traffic classification
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
biblio
A simulated criminal attack
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
a simulated criminal attack
advanced attack
branch office attack exercise
branch office attack plan
Computer crime
firewalls
head office attack exercise
head office attack plan
on-site reconnaissance
pubcrawl170109
Red Team exercise
remote information gathering
spear phishing exercise
spear phishing plan
threat analysis
« first
‹ previous
1
2
3
4
5
next ›
last »