Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network services
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
biblio
Hadoop-based Dark Web Threat Intelligence Analysis Framework
Submitted by grigby1 on Fri, 07/10/2020 - 11:54am
Hadoop
Tor
threat intelligence information
threat intelligence
pubcrawl
network services
internet
Human Factors
Human behavior
HBase-based distributed database
Hadoop-based dark web threat intelligence analysis framework
anonymous messaging
Distributed databases
data privacy
data handling
dark-net threat intelligence
dark web
dark network research
dark network criminal networks
crime messages
anonymous user communication
anonymous TOR tool
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
Network Scanning and Mapping for IIoT Edge Node Device Security
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
pseudorandom periodic manner
Metrics
microcontroller units
microcontrollers
Monitoring
network scanning
network services
performance evaluation
predictive maintenance
MCU
pubcrawl
Resiliency
Scalability
scanning procedure
security
security of data
Servers
building block
light emitting diodes
Internet of Things
industrial networks
Industrial Internet of Things
industrial environment
industrial control
Image edge detection
IIoT edge node sensors
IIoT edge node device security
iiot
Hardware
edge device
edge detection
computer network security
composability
biblio
A Programmable Network Management Architecture for Address Driven Network
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
network management
YANG
REST APIs
programmable network management architecture
network protocols
network management functions
NETCONF
innovative network architecture
flexible management
Configuration Management
address driven network
Network Security Architecture
network services
computer network security
application program interfaces
Load modeling
Routing
pubcrawl
Resiliency
network security
Data models
computer network management
Protocols
security
IP networks
biblio
An architecture to manage security services for cloud applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Software
management practice
network services
operation models
Security architectures
security orchestrator
security perimeter
security services
service orchestration
Inspection
software orchestration
Topology
ubiquitous computing
virtual functions
Virtualization
Pervasive Computing Security
Human Factors
security
cyber-security paradigms
cyber-security architecture
cloud-based distributed applications
cloud technologies
cloud application
Human behavior
resilience
Resiliency
Metrics
pubcrawl
computer architecture
Scalability
Monitoring
Cloud Computing
security of data
biblio
Identity and Access Control for Micro-services Based 5G NFV Platforms
Submitted by aekwall on Mon, 12/16/2019 - 2:30pm
authorization
Internet of Things
cyber-physical systems
pubcrawl
authentication
identity
resilience
5G
DevOps
JSON Web Token
Keycloak
micro-services
network services
NFV MANO
virtual network functions
controller area network security
biblio
A SDN security control forwarding mechanism based on cipher identification
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
network management
user nonrepudiation
software defined networking
Servers
security control forwarding
SDN network security control forwarding mechanism
SDN
Resiliency
resilience
Repudiation
pubcrawl
programmability
packet authenticity
Object recognition
network services
authentication
network architecture
Metrics
human factor
Human behavior
forwarding device
flow table matching
Databases
Cryptography
control capabilities
computer network security
computer network management
composability
Ciphers
cipher identification
biblio
Abstractions and Solutions to Support Smart-objects in the Future Internet
Submitted by grigby1 on Tue, 03/07/2017 - 1:50pm
future Internet architecture
internet
Mobility
named objects
network abstractions
network services
pubcrawl170201
smart-objects
virtual networks
biblio
A Spoofing Attack against a Cancelable Biometric Authentication Scheme
Submitted by BrandonB on Tue, 05/05/2015 - 8:48am
homomorphic encryption algorithms
Vectors
unexpected vector
spoofing attack
Servers
replay attack
registered biometric information
Public key
privileged entity
network services
list attack
IrisCode
ID-password-based authentication
analogue biometric information
feature vector
encryption
decryption key
Cryptography
competitive code
cancelable biometric authentication scheme
biometrics (access control)
biometric information
binary coding
authorisation
authentication