Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
control systems
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chain verification
security chains
security functions
model checking
smart devices
SMT
software defined networking
software-defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chains
security chain verification
security functions
model checking
smart devices
SMT
software-defined networking
software defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
Implementation of industrial cloud applications as controlled local systems (CLS) in a smart grid context
Submitted by grigby1 on Wed, 02/21/2018 - 1:54pm
power engineering computing
wide area networks
smart power grids
smart meters
smart metering infrastructure
Smart Grids
Smart Grid Privacy
smart grid context
security
Scalability
Resiliency
resilience
remotely controlled devices
pubcrawl
Cloud Computing
Meters
Logic gates
industrial machines
Industrial Cloud Applications match
Human Factors
Human behavior
Germany
energy devices
data privacy
Controllable Local Systems
control systems
collected measurement data
CLS devices
biblio
Edge-ICN and its application to the Internet of Things
Submitted by grigby1 on Wed, 02/21/2018 - 1:49pm
Metrics
Semantics
Resiliency
resilience
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy governance
Payloads
clean slate
IP networks
Human Factors
human factor
Human behavior
encoding
control systems
computer architecture
collaboration
biblio
SONA: Improving Situational Awareness of Geotagged Information Using Tangible Interfaces
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
physical security environment
user interfaces
Urban areas
Three-dimensional displays
tangible interfaces
tangible controller system
Spatiotemporal system Organized for Natural Analysis
Spatiotemporal phenomena
SONA
situational awareness
security
Resiliency
pubcrawl
Cameras
Monitoring
Metrics
geotagged information
geographic information systems
Feeds
digital map
control systems
composability
closed circuit television
CCTV multiscreen method
cartography
biblio
Preventing Collusion between SDN Defenders Anc Attackers Using a Game Theoretical Approach
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
preventing collusion
software defined networking
socio-rational approach
Silicon
SDN defenders
SDN controller
Resiliency
reputation system
repeated-game setting
Reconnaissance
pubcrawl
anti-collusion solution
Network reconnaissance
Games
game-theoretical solution concept
game theory
game theoretical approach
control systems
Conferences
computer network security
Computer crime
collusion attack
biblio
Inferring OpenFlow Rules by Active Probing in Software-Defined Networks
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
delays
Receivers
Reconnaissance
Resiliency
rule inference
security threats
software defined networking
Software-Defined Networks
telecommunication security
active probing
Apriori algorithm
clustering
control systems
controllers
reactive rules
Denial-of-Service
DoS attacks
inferring sdn by probing and rule extraction
INSPIRE
IP networks
k-means clustering
Network reconnaissance
OpenFlow rules
packet delay time
Probes
Probing
probing packets
pubcrawl
biblio
Exploiting Submodularity in Security Measure Allocation for Industrial Control Systems
Submitted by grigby1 on Tue, 02/06/2018 - 2:02pm
Industrial Control Systems Anomaly Detection
control systems
cyber-attacks
Human behavior
Human Factors
Metrics
pubcrawl
Resiliency
Scalability
Security measure allocation
Security Risk Estimation
submodularity
biblio
Process-aware side channel monitoring for embedded control system security
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
run-time parameters
microcomputers
Monitoring
network connectivity
process stability
process-aware side channel monitoring
pubcrawl
Real-time monitoring
Resiliency
Metrics
security
side channel sensors
side channel sensory modalities
side channels
software components
Temperature measurement
Temperature sensors
thermal
Cryptography
acoustic
analog side channels
composability
computational loop
control logic
control systems
CPS computational nodes
CPS device
actuator security
cyber-attacks
cyber-physical systems
embedded control system security
embedded systems
Fans
feature extraction
heterogeneous hardware
biblio
A resilient distributed controller for software defined networking
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
software defined networking
Software
Resilient Security Architectures
resilient distributed controller
Resiliency
resilience
pubcrawl
Proposals
placement optimization
optimization
optimisation
network topology
control systems
control plane distribution
computer architecture
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »