Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
overlay networks
biblio
Proposal of an extended CYPHONIC adapter supporting general nodes using virtual IPv6 addresses
Submitted by grigby1 on Fri, 02/24/2023 - 4:31pm
Prototypes
Zero-trust security
Overlay network protocol
dual-stack
CYPHONIC
overlay networks
IPv6
Waste materials
Policy Based Governance
composability
Internet of Things
Hardware
Throughput
Resiliency
resilience
Metrics
pubcrawl
IP networks
security
collaboration
biblio
SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay
Submitted by grigby1 on Thu, 06/09/2022 - 1:29pm
Redundancy
Spines Overlay
networks
Interledger
ILP
Geography
intrusion tolerance
overlay networks
distributed ledger
Performance
pubcrawl
blockchain
Fault tolerant systems
fault tolerance
network security
Protocols
Resiliency
resilience
Human Factors
biblio
Evaluating Connection Resilience for Self-Organizing Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 10:28am
Conferences
CPS
CPS resilience
cps resiliency
cyber-physical systems
Industries
information security
network connectivity
overlay networks
Peer-to-peer computing
pubcrawl
resilience
Smart cameras
biblio
Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary
Submitted by grigby1 on Wed, 02/09/2022 - 1:49pm
Numerical models
anonymity
anonymous routing
Censorship resistance
composability
Costs
encryption
Human behavior
Metrics
Topology
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
biblio
WIP: An Onion-Based Routing Protocol Strengthening Anonymity
Submitted by grigby1 on Wed, 02/09/2022 - 1:46pm
Onion
Analytical models
anonymity
Anonymous Communication Networks
composability
Global Adversary Model
Human behavior
Metrics
Multimedia communication
Wireless communication
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
timing
biblio
Resilient Control in the Presence of Man-in-the-Middle Attacks
Submitted by aekwall on Mon, 12/20/2021 - 11:17am
estimation
pubcrawl
Metrics
Resiliency
Human behavior
composability
cyber-physical systems
Redundancy
Safety
control systems
actuators
overlay networks
actuator security
biblio
Auditable secure network overlays for multi-domain distributed applications
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
Metrics
Virtual private networks
software stack
Resiliency
resilience
Public key
pubcrawl
Prototypes
overlay networks
overlay network
organisational boundaries
operational infrastructure
network accountability
multidomain overlay network
multidomain distributed applications
actionable contracts
marketplace
internet
digital data market place infrastructure
data sharing
Data processing
Data collection
Cryptography
contracts
computer network security
composability
communication fabric
auditing
auditable secure network overlays
actors
biblio
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
emergency response networks
Compositionality
Network
emergency management
emergency services
building mobile device trust
building resiliency
communication utility patterns
crowd sensing
Buildings
MACH 2K
MACH-2K trust overlay network architecture
message confidentiality
Mobile handsets
private mobile devices
public service networks
vpn
manet privacy
pubcrawl
architecture
Cryptography
data privacy
Organizations
telecommunication security
History
computer architecture
Resiliency
security
overlay networks
Peer-to-peer computing
Metrics
trust
Ad hoc networks
MANET
mobile ad hoc networks
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
NFV
VSNs
virtualisation
virtual shadow networks
telecommunication network topology
software defined networking technologies
software defined networking
Servers
SDN
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
overlay networks
centralized management
network topology
Network reconnaissance
network function virtualization
MTD
moving target defense
mirrors
link-map
ISP
Internet Service Provider networks
internet
flooding reconnaissance attacks
DDoS Attacks
computer network security
Computer crime
biblio
Blockchain Based Security Framework for P2P Filesharing System
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
P2P filesharing system
Sybil attack
security
Scalability
routing table insertion attack
Routing
Resiliency
resilience
pubcrawl
Protocols
peer-to-peer network
peer-to-peer filesharing system
Peer-to-peer computing
peer to peer security
blockchain
overlay networks
Metrics
Human Factors
human factor
Human behavior
Free riding
file sharing
dynamic self-organized technology
cryptocurrencies
computer network security
collaboration
Blockchain based security framework
1
2
next ›
last »