Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wide area networks
biblio
Multi-Link Failure Effects on MPLS Resilient Fast-Reroute Network Architectures
Submitted by aekwall on Thu, 12/01/2022 - 3:37pm
computer architecture
Routing
Switches
pubcrawl
Resiliency
Web and internet services
network architecture
wide area networks
networking
Fast Re Route Delays
MPLS
Multi Protocol Label Switching
multiprotocol label switching
Resilient Security Architectures
biblio
Security Issues in Narrowband-IoT: Towards Green Communication
Submitted by aekwall on Fri, 09/30/2022 - 1:46pm
Human behavior
NB-IOT
Channel Quality Information (CQI)
SCA
game theory
uav
wide area networks
IoT security
Proposals
composability
security
Resiliency
Metrics
pubcrawl
performance evaluation
Internet of Things
Unmanned Aerial Vehicles
IoT
Task Analysis
biblio
A Review on RPL Objective Function Improvements for IoT Applications
Submitted by aekwall on Mon, 11/29/2021 - 12:54pm
security
IoT
Routing
Internet of Things
Protocols
pubcrawl
Resiliency
composability
6LoWPAN
traffic control
RPL
Linear programming
objective function
wide area networks
biblio
Development of an Intrusion Detection System Using a Botnet with the R Statistical Computing System
Submitted by grigby1 on Wed, 09/08/2021 - 8:34am
Intrusion Detection
wide area networks
Resiliency
resilience
r
pubcrawl
Prevention
Metrics
malware
Logic gates
Bot
intrusion
Information services
Human behavior
Electronic publishing
detection
DDoS Attack Prevention
composability
botnet
biblio
iDaaS: Inter-Datacenter Network as a Service
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
Resiliency
Internet-scale Computing Security
lower bandwidth price
Metrics
multiple iDaaS providers
Policy Based Governance
predictable network performance
Pricing
private wide area networks
pubcrawl
resilience
Internet-scale applications
Scalability
service-inter-datacenter network
Stackelberg game
telecommunication traffic
traditional application providers
unpredictable network performance
video streaming
WANs
wide area networks
wide area traffic
efficient bandwidth pricing algorithm
bandwidth allocation
bandwidth guarantee
bandwidth price
bandwidth reservation algorithms
bandwidth trading market
Cloud Computing
collaboration
composability
computer centres
Distributed databases
Bandwidth
game theory
Games
Google
Human behavior
Human Factors
iDaaS provider
Inter-datacenter network
Inter-Datacenter Network as a Service
internet
Internet giants
biblio
Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)
Submitted by aekwall on Mon, 04/13/2020 - 9:07am
Local area networks
Security by Default
Software Defined Perimeter
SD-WAN
SD-Node
machine-to-machine communications
machine-to-machine communication
M2M devices
industrial Internet of Things for Critical Infrastructure
industrial application
IIoT-CI
wide area networks
Software Defined Networks
computer network security
SDN
risk management
pubcrawl
Resiliency
critical infrastructure
software defined networking
Software
Protocols
security
Internet of Things
Scalability
ddos mitigation
biblio
Multi-Operator Orchestration of Connectivity Services Exploiting Stateful BRPC and BGP-LS in the 5GEx Sandbox
Submitted by grigby1 on Fri, 03/27/2020 - 10:37am
connectivity services
wide area networks
virtualisation
stateful BRPC
segment routing
Routing protocols
QoS-based connectivity
optical fibre networks
optical domains
Multioperator orchestration
multioperator multitechnology transport network
free-space optical communication
European 5GEx Sandbox
collaboration
BGP-LS
backward recursive PCE-based computation
5GEx multidomain orchestrator
sandboxing
delays
Routing
composability
Topology
quality of service
5G mobile communication
policy-based governance
pubcrawl
biblio
Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
6LoWPAN border routers
victim devices
low-power sleep modes
lightweight protocols
IoT device
Denial-of-Sleep Attack
deep en-route filtering
constrained application protocol messages
CoAP server
CoAP messages
Servers
wide area networks
Data Security
6LoWPAN
telecommunication network routing
composability
pubcrawl
Resiliency
Protocols
Internet of Things
biblio
Data Acquisition Network and Application System Based on 6LoWPAN and IPv6 Transition Technology
Submitted by aekwall on Mon, 01/13/2020 - 11:04am
personal area networks
wide area networks
tunnel
rich IPv6 address
multiservice data storage
low-power wide-area network wireless communication technology
IPv6
IPv4 address exhaustion
internal sensor network
device access management
data acquisition network
application system
affair data service
actual uploaded river quality data
6to4 tunnel
6to4
Monitoring
internetworking
data packet
sensors
6LoWPAN
data acquisition
internet
Routing
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
Servers
IP networks
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
1
2
next ›
last »