Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internetworking
biblio
A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network
Submitted by grigby1 on Tue, 12/06/2022 - 2:51pm
6LoWPAN
Resiliency
resilience
composability
pubcrawl
hospitals
Industries
internetworking
IoT
LLNs
network topology
Routing
Routing protocols
RPL
Software algorithms
WSN
biblio
Managing the Evolution to Future Internet Architectures and Seamless Interoperation
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
network management perspective
interoperability
IoT
IP networks
Logic gates
Metrics
MobilityFirst
NDN
network architecture
internetworking
network servers
open systems
policy-based approach
Protocols
pubcrawl
resilience
Resiliency
seamless interoperation
encryption
architectural island separation
clean slate
COIN
collaboration
computer architecture
computer network management
content retrieval
content-oriented interoperability framework
application-layer object resolution service
Future Internet Architectures
Human behavior
ICN
industrial automation
information-centric networking
information-centric networks
internet
Internet architectures
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
multihop scenarios
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
content transfer
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
Libraries
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
computer network security
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
MVP mode
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
remote monitoring
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
computerised monitoring
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
security
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
biblio
Experimenting with Real Application-specific QoS Guarantees in a Large-scale RINA Demonstrator
Submitted by aekwall on Tue, 09/08/2020 - 10:16am
perceived quality of experience
effective QoS support
end-user
ERASER disclose
experienced QoS metrics end-to-end
Fed4FIRE + medium experiment ERASER
HD video streaming demonstration
heterogeneous applications
large-scale experimentation
large-scale RINA demonstrator
network load conditions
diverse QoS requirements
QTA-Mux
quality of experience
RINA
synthetic application traffic
t network locations
video streaming sessions
video traffic
virtual wall experimentation facility
clean slate
policy governance
internetworking
telecommunication traffic
computer architecture
Resiliency
Human behavior
pubcrawl
Metrics
5G mobile communication
delays
quality of service
QoS
Servers
Streaming media
video streaming
Metropolitan area networks
telecommunication scheduling
37-node 5G metro RINA network scenario
37-node 5G regional RINA network scenario
accepted candidate scheduling policy
actual quality of service guarantees
application-specific QoS guarantees
clean-slate recursive internetwork architecture
biblio
Securing User Access at IoT Middleware Using Attribute Based Access Control
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
pubcrawl
user access control
typical IoT system model
middleware layer
IoT system architecture
IoT gateway
device data
attribute based access control
IoT middleware
data handling
internetworking
middleware
Logic gates
authentication
policy-based governance
security
Human behavior
data encryption
IoT devices
Internet of Things
attribute-based encryption
Cryptography
authorization
authorisation
Access Control
ciphertext-policy attribute-based encryption
Scalability
computer network security
IoT
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
network threats
user privacy in the cloud
privacy-preserving Sharing
privacy-preserving means
privacy preserving
privacy exposure
cyber threat management
Cyber Threat Information
CTI data
Confidential Information Sharing and Analysis for Cyber Protection
Collaborative sharing
collaborative analysis
C3ISP Framework
attack prediction
API Gateway
data sharing
security of data
information management
data sources
Portals
internetworking
application program interfaces
Scalability
Logic gates
collaboration
cyber-attacks
Metrics
pubcrawl
Resiliency
security
data privacy
Cloud Computing
biblio
A Design of Digital Signature Mechanism in NDN-IP Gateway
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Internet architecture
TCP/IP technology
NDN-TCP/IP
NDN-IP gateway
NDN-IP Custom-Router Gateway
NDN-based network implementation
IP-based network
IP addresses
gateway
digital signature processing
digital signature mechanism
data naming
data authenticity
computer network security
digital signature
named data networking
NDN
internetworking
digital signatures
internet
pubcrawl
Resiliency
security
Scalability
IP networks
biblio
Intelligent Architecture and Hybrid Model of Ground and Launch System for Advanced Launch Site
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
Physical layer
internetworking
landing area
launch processes
launch system
launch systems
launch vehicle
middleware
middleware security
network layer
perception layer
Internet of Things
physical objects
policy-based governance
pubcrawl
resilience
Resiliency
security of data
sensors
Space vehicles
test operation
intelligent analysis assessment system
aerospace control
Application Layer
architectural framework
automatic control system crossing
Cloud Computing
command and control systems
composability
data processing system
flight payloads
advanced launch site system
intelligent architecture
intelligent command
intelligent control
intelligent elements
intelligent flight
intelligent functional architecture
intelligent launching region
intelligent system model
intelligent technical area
1
2
3
next ›
last »