Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internetworking
biblio
Design of an Authentication and Key Management System for a Smart Meter Gateway in AMI
Submitted by grigby1 on Wed, 05/30/2018 - 4:09pm
privacy
two-phase authentication mechanism
SMGW
smart meters
smart meter gateway
smart meter
smart grid consumer privacy
Smart Grid
smart appliance control
security concerns
pubcrawl
Protocols
privacy concerns
AMI
power usage statistics
Logic gates
key management scheme
internetworking
Human Factors
home automation systems
home automation
Home appliances
encryption
domestic appliances
DLMS/COSEM
authentication
biblio
CENTRA: CENtrally Trusted Routing vAlidation for IGP
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
routing policies
PKI
practical Internet
pubcrawl
public key cryptography
public key infrastructure
real-time systems
resilience
Resiliency
Routing
routing monitoring systems
OSPF
Routing protocols
Scalability
SDN
secure routing mechanism
secure routing policy
Software Defined Network
software defined networking
Trust Routing
trusted routing
YANG
IGP
anomalous routing detection
Anomaly Detection
authentication
CENTRA
Centrally Controlling
CENtrally Trusted Routing vAlidation framework
communication protocol
composability
computer network security
Data Model
anomalous routing blockage
interior gateway protocols
internet
Internet service providers
internetworking
ISP
knowledge base-this
Monitoring
Neighbor
NETCONF
network security
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
Vehicle Network Security Testing
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
testing
Patterns
Payloads
Protocols
pubcrawl
resilience
Resiliency
security
security loophole
pattern decoding
V2V
V2V V2X loopholes
V2X
vehicle
vehicle network security testing
vehicular ad hoc networks
white box approach
White Box Encryption
gateway module security testing
black box approach
CAN
Communication networks
composability
computer network security
diagnostics security
ECU
Ethernet
authentication
gateway security
grey box approach
in-vehicle network security implementation
in-vehicle networks
internetworking
message authentication
Metrics
Network
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
biblio
Towards a secure smart grid storage communications gateway
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
internetworking
telecommunication security
standards
smart power grids
Smart Grids
Smart Grid Privacy
security requirements
secure smart energy communications devices
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy issues
machine-to-machine communication
Logic gates
authentication
ICT system
Human Factors
Human behavior
HORIZON 2020 project STORY
hands-on configuration advice
Energy storage
Energy Efficiency
electric storage technologies
data storage
cyber-physical systems
cyber security measures
Cryptography
communications gateway
communication line security
backend M2M communications protocols
biblio
FOGG: A Fog Computing Based Gateway to Integrate Sensor Networks to Internet
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
wireless sensor networks
sensor security
sensor networks
sensor network integration
network servers
IoT gateway
IoT devices
internetworking
information centric networking
ICN
heterogeneous sensor networks
FOGG
fog computing based gateway
Fog computing
edge computing
security
Logic gates
IP networks
internet
Cloud Computing
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
IoT based ransomware growth rate evaluation and detection using command and control blacklisting
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Servers
network security
physical devices
pubcrawl
Ransomware
ransomware attacks statistics
ransomware growth rate detection
Resiliency
Scalability
Metrics
statistical analysis
TCP/IP header extraction
TCP/IP traffic
telecommunication traffic
threatening ransomware attacks
transport protocols
Web proxy server
command and control blacklisting
malware
locky ransomware
IP networks
IoT environment
invasive software
internetworking
Internet of Things
internet
encryption
emerging ransomware families
Elliptic curve cryptography
detection using command
cyber-attack threat
Cryptowall ransomware attack detection model
computer network security
biblio
A network data security analysis method based on DPI technology
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
protocol matching
network data legality
network data security analysis
network servers
Policy
policy-based governance
power system
power system security
protocol analysis
matched filters
protocol parsing
Protocols
pubcrawl
Resiliency
security gateway
Servers
threat data
visiting data security
deep packet inspection technology
Artificial Neural Networks
collaboration
computer network security
data content detection
data filtering
data legitimacy
data protocol
deep packet inspection (DPI) technology
artificial neural network
DPI technology
Fingerprint recognition
Governance
Government
Inspection
internetworking
Logic gates
biblio
On the performance of the LISP beta network
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
internetworking
USA site
Routing protocols
Routing
median mapping resolution delay
locator-identifier separation protocol
LISP interworking infrastructure
LISP Beta Network reliable performance
IP networks
IP address
interworking mechanism
BGP churn reduction
internet
European infrastructure
Europe
delays
Databases
control plane
computer network reliability
BGP table size reduction
BGP routing policy
« first
‹ previous
1
2
3