Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
firewall
biblio
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
Submitted by aekwall on Mon, 04/13/2020 - 10:14am
ROS
SIEM
security event management system
SDN-based security policy enforcement
ROSDefender
ROS-Defender
robotics systems
robotics
Robotic system
OpenvSwitch
IPS
dynamic policy enforcement points
anomaly detection systems
intrusion prevention system
robotic applications
computer network security
robots
Robot sensing systems
security policies
SDN
Peer-to-peer computing
policy-based governance
pubcrawl
software defined networking
Linux
security
Access Control
Servers
firewall
biblio
Industrial Control Systems (Ics) Security in Power Transmission Network
Submitted by grigby1 on Tue, 01/21/2020 - 12:15pm
Organizations
supervisory control and data acquisition
Scalability
SCADA
Resiliency
resilience
pubcrawl
power transmission network
power transmission control
power system security
power stations
power grids
power distribution grids
power distribution control
Industrial Control Systems Anomaly Detection
IT security
integrated circuits
industrials plants
Industrial Control Systems
industrial control system security
industrial control
ICS security
ICs
Firewalls (computing)
firewall
Cybersecurity
control systems
biblio
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
internet
traffic classifier
telecommunication traffic
Servers
Resiliency
resilience
pulse wave type DDoS-attack prevention
pubcrawl
network technologies
Network
Metrics
IP networks
botnet
Human behavior
firewalls
firewall
dpi
DDoS Attack Prevention
DDoS attack detection
DDoS
Computer crime
composability
Communication networks
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
biblio
Access Control Policy Enforcement for Zero-Trust-Networking
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
Scalability
policy enforcement
policy enforcement framework
policy-based governance
Production
pubcrawl
resilience
Resiliency
rigorous access control
risk-based access control
risk-based access control decision making
network zone
securing computer networks
Software
transaction-based interactions
trust
virtualized infrastructures
zero trust
zero trust networking
zero-trust-networking
zone resources
ZTN networks
Firewalls (computing)
access control process
authorisation
authorization
computer network management
computer network security
computer networks
Decision Making
dynamicity
enterprise computing landscape
firewall
access control policy enforcement
fog/edge computing
generic firewall policy language
heterogeneous user contexts
Human behavior
Human Factors
industrial internet
Internet of Things
micro-segment
network topology
biblio
A scalable and flexible DDoS mitigation system using network function virtualization
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
scalable dispatcher
IP networks
legitimate traffic
metric
network function virtualization
Network Function Virtualization architecture
online websites
pubcrawl
Resiliency
Scalability
scalable DDoS mitigation system
Human behavior
Scalable routing
Servers
SYN flood attack
target server
telecommunication traffic
third-party cloud-based DDoS
threat mitigation
virtual network agents
virtualisation
distributed denial of service
attack traffic
batching forwarding
bucket-based forwarding mechanism
Cloud Computing
Computer crime
computer network security
DDoS defense framework
DDoS defense solutions
ddos mitigation
Dispatching
agent addition
distributed denial of service attacks
dropping rate
enterprise networks
excessive traffic delay
firewall
firewalls
flexible DDoS mitigation system
flexible dispatcher
highly flexible solutions
biblio
System architecture for deep packet inspection in high-speed networks
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
PeerDirect
graphics processing units
Hardware
hardware tools
hardware-software solution
high-speed networks
Inspection
Mellanox
Napatech
Nvidia
graphics processing unit
pubcrawl
real-time data analysis
resilience
Resiliency
Scalability
software requirements
system architecture
Zero-copy
data communication
Central Processing Unit
computer architecture
computer network
computer network security
computing devices
CPU
CUDA
data analysis
bit rate 80.0 Gbit/s
data transmission networks
data volume real-time processing
deep packet inspection
DMA
DPDK
dpi
firewall
GPUDirect
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
biblio
XFirewall: A Dynamic and Additional Mitigation Against DDoS Storm
Submitted by grigby1 on Tue, 01/16/2018 - 6:28pm
composability
DDoS
DDoS Attack Prevention
firewall
Human behavior
Metrics
Network
NFV
pubcrawl
Resiliency
security
biblio
TLS Proxies: Friend or Foe?
Submitted by K_Hooper on Wed, 09/27/2017 - 1:22pm
adwords
firewall
Human behavior
malware
man in the middle
Measurement
Metrics
MITM
proxy
pubcrawl
Resiliency
scalabilty
security
SSL
SSL Trust Models
TLS
« first
‹ previous
1
2
3
next ›
last »