Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IPS
biblio
Blacklisted IP Distribution System to Handle DDoS Attacks on IPS Snort Based on Blockchain
Submitted by grigby1 on Tue, 09/07/2021 - 3:22pm
IP networks
testing
smart contracts
smart contract
Servers
Resiliency
resilience
pubcrawl
Metrics
IPS
Blacklisted IP
Human behavior
denial-of-service attack
DDOS attacks detection
DDoS Attack Prevention
DDoS attack mitigation
DDoS
Computer crime
composability
blockchain
biblio
5G QoS: Impact of Security Functions on Latency
Submitted by grigby1 on Wed, 08/11/2021 - 12:01pm
pubcrawl
Human Factors
Metrics
resilience
Resiliency
composability
Linux
QoS
5G
network slicing
URLLC
DPDK
IPS
latency
operating system (OS)
iOS Security
biblio
FPGA Bitstream Security: A Day in the Life
Submitted by grigby1 on Mon, 11/02/2020 - 12:29pm
IPS
system-on-chip platforms
system-on-chip
system integrator
SoC platform
security concerns
security
Resiliency
resilience
reconfigurable architectures
pubcrawl
policy-based governance
bitstream file
intellectual property security
intellectual properties
industrial property
FPGA security
FPGA designs
FPGA bitstream security
field programmable gate arrays
encryption
composability
Bitstream Protection
bitstream lifecycle
biblio
Multipath Traffic Engineering for Software Defined Networking
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IP networks
telecommunication traffic
Streaming media
software defined networking
service quality criteria
Scalability
Resiliency
resilience
quality of service
pubcrawl
Protocols
packet communication
network bandwidths
multipath traffic engineering
multimedia market
IPS
application-aware mechanism
Internet video sharing
internet
Inspection
IDS
Firewalls (computing)
firewall
dpi
deep packet inspection
control systems
communication bottlenecks
Broadcasting
broadcast television
bandwidth restrictions
ASA systems
biblio
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
Submitted by aekwall on Mon, 04/13/2020 - 10:14am
ROS
SIEM
security event management system
SDN-based security policy enforcement
ROSDefender
ROS-Defender
robotics systems
robotics
Robotic system
OpenvSwitch
IPS
dynamic policy enforcement points
anomaly detection systems
intrusion prevention system
robotic applications
computer network security
robots
Robot sensing systems
security policies
SDN
Peer-to-peer computing
policy-based governance
pubcrawl
software defined networking
Linux
security
Access Control
Servers
firewall
biblio
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
pubcrawl
logic locking method
malicious circuits
million-gate circuits
outsourcing
PCA-based HT detection methods
power analysis-based Trojan detection
power consumption
power consumption analysis
Power demand
principal component analysis
Process Variations
logic locking
resilience
security
semiconductor companies
small sub-circuit collection
supply chain security
Switches
system-on-chip
trojan horse detection
Trojan horses
untrustworthy fabs
hardware Trojan detection
policy-based governance
composability
IP piracy
circuit block extraction
circuit power
cyber physical systems
design for hardware trust
fabrication foundries
gate level
Hardware
Hardware Security
Resiliency
hardware Trojan threat
HT activity
HT power
HT-infected circuits
industrial property
integrated circuit layout
intellectual properties
invasive software
IPS
Logic gates
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
biblio
Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
logic architecture
software-defined network
software defined networking
Software
Servers
security
SDN network
Resiliency
resilience
pubcrawl
Metrics
malicious packet
logic network
Adaptive Intrusion Prevention System
IPS
IP networks
intrusion prevention system
host attacks
fuzzy set theory
Fuzzy logic
computer network security
computer architecture
attacker host
attack prevention
adaptive systems
adaptive IPS
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime
biblio
WIDIP: Wireless distributed IPS for DDoS attacks
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
IP networks
Wireless communication
wireless
tools
Servers
Resiliency
pubcrawl
Metrics
IPS
Communication system security
IDS
Human behavior
DoS
DDoS Attack Prevention
DDoS
Computer crime
composability
1
2
next ›
last »