Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network resources
biblio
A Pseudonym Certificate Management Scheme Based on Blockchain for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 10:49am
public key cryptography
pseudonym certificate management scheme
Pseudonym certificate
lifecycle
distributed maintenance
cybercrime attacks
network resources
cyber physical systems
Internet of Vehicles
certification
certificate revocation list
Human Factors
network structure
automobiles
standards
blockchain
Metrics
Cryptography
privacy
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
security of data
Safety
biblio
Blockchain-Based Internet of Vehicles (IoV): An Efficient Secure Ad Hoc Vehicular Networking Architecture
Submitted by aekwall on Mon, 10/19/2020 - 10:47am
connected vehicles
secured communication
secure ad hoc vehicular networking architecture
distribution cloud
distributed access control system
connected vehicle communication network
blockchain-based Internet of Vehicles
information sharing
network resources
Smart City
cyber physical systems
IoV
Internet of Vehicles
distributed control
telecommunication network reliability
security
Human Factors
blockchain technology
Intelligent sensors
Reliability
blockchain
Metrics
vehicular ad hoc networks
privacy
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
telecommunication traffic
biblio
Gestures Based CAPTCHAs the Use of Sensor Readings to Solve CAPTCHA Challenge on Smartphones
Submitted by grigby1 on Fri, 09/11/2020 - 10:43am
security mechanism
Usability.
sensor readings
network resources
gyroscopes
gyroscope data
gestures
gesture CAPTCHA challenge
CAPTCHA
Accelerometers
accelerometer readings
captchas
malware
usability
gesture recognition
security of data
Smartphones
mobile devices
smart phones
human computer interaction
Mobile handsets
invasive software
mobile computing
composability
performance evaluation
Human behavior
pubcrawl
Servers
security
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
MobilityFirst future Internet architecture
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
clean separation
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
5G mobile communication
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
Protocols
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN
Submitted by aekwall on Mon, 06/29/2020 - 11:56am
efficient service delivery
Switches
DDoS detection
Meters
data plane
denial-of-service attack
network resources
centralized controller
attack volume
OpenFlow protocol
network safe
network security threat
networking infrastructure
OpenFlow enabled SDN
UDP flooding
user datagram protocol
DDoS attack mitigation
composability
computer network security
DDoS
IP networks
software defined networking
DDoS Attacks
Resiliency
Human behavior
pubcrawl
Computer crime
Protocols
Metrics
internet
Entropy
OpenFlow
SDN
Bandwidth
biblio
Detection and Mitigation of DDoS Attacks Using Conditional Entropy in Software-defined Networking
Submitted by aekwall on Mon, 06/29/2020 - 11:47am
DDoS attack mitigation
SDN security
network revolution
mitigation
lightweight approach
DDoS attack detection
control logic
conditional entropy
centralized management unit
centralized control
basic packet forwarding equipment
network resources
centralised control
DDoS detection
computer network security
distributed denial of service attacks
telecommunication control
SDN
software-defined networking
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
DDoS
biblio
SEAF: A Secure, Efficient and Accountable Access Control Framework for Information Centric Networking
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
privacy protection
service accountability
Secure
SEAF
next-generation network
network resources
network edge
in-network cache
efficient and accountable access control framework
effective access control mechanism
delivery service
content providers
content delivery
cache-enabled routers
network accountability
cache storage
computer network security
ICN
information centric networking
delays
authentication
internet
Metrics
privacy
composability
pubcrawl
Resiliency
data privacy
Access Control
encryption
Cryptography
authorisation
biblio
A Command-by-Intent Architecture for Battlefield Information Acquisition Systems
Submitted by grigby1 on Mon, 12/10/2018 - 10:34am
pubcrawl
military operations
mission information
mission information needs
mission success rate
mission-critical decision making
NATO-based mission scenario
network resources
operational mission goals
Prefetching
military computing
real-time information collection
resilience
Resiliency
Scalability
sensor fusion
Sensor Systems
subordinate units
target tracking
target tracking application
Decision Making
Bandwidth
battlefield information acquisition systems
cache storage
Command-by-intent
command-by-intent architecture
commander intent
data fusion system
Data integration
decision authority
Anglova
Decision trees
Decision-centric
forwarding caching relevant data
Human Factors
information needs
Information systems
Internet of battlefield things
iobt
biblio
Event graphs for the observation of botnet traffic
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
information security
telecommunication traffic
statistical flow-based analysis
sensitive information
Resiliency
resilience
pubcrawl
privacy
network vulnerabilities
network resources
network event correlation method
Metrics
Malware Analysis
malware
Algorithm design and analysis
Image edge detection
Human behavior
host machines
graph theory
event graphs
cyber-crime campaigns
Correlation
computer security
computer network security
botnet traffic
botnet
bot programs
1
2
next ›
last »