Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual private networks
biblio
A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis
Submitted by grigby1 on Fri, 03/31/2023 - 10:28am
Logic gates
pubcrawl
Human behavior
Scalability
telecommunication traffic
Virtual private networks
bitcoin
Distributed databases
Government
Weapons
Human Factors
Traffic analysis
Bitcoin transactions
Traceability Method
bitcoin security
biblio
Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices
Submitted by grigby1 on Fri, 02/17/2023 - 4:40pm
Safety
vulnerabilities
Virtual private networks
threats
supply chains
Standards organizations
software reliability
software assurance
Software
security
Scalability
Information Assurance
Resiliency
resilience
pubcrawl
privacy
Operating-Systems
legislation
integrity
Information-Assurance
Hack
attack
biblio
Behaviour Analysis of Open-Source Firewalls Under Security Crisis
Submitted by grigby1 on Fri, 01/13/2023 - 11:50am
Flooding
Ping of death
pfSense
OPNSense
Open-source Firewalls
Nmap
Medusa
HYDRA
hping3
Firewall performance
Brute Force Attack
Security by Default
signal processing
Force
Firewalls (computing)
Virtual private networks
Floods
Wireless communication
Scalability
Resiliency
resilience
pubcrawl
security
biblio
Applied Cryptography in Network Systems Security for Cyberattack Prevention
Submitted by grigby1 on Tue, 08/02/2022 - 3:20pm
Applied cryptography
Cryptography
encryption
fabrication
Hash functions
Interception
Interruption
modification
network security
pubcrawl
Public key
resilience
Resiliency
RSA
Trustworthy Systems
Virtual private networks
biblio
VPNoT: End to End Encrypted Tunnel Based on OpenVPN and Raspberry Pi for IoT Security
Submitted by aekwall on Mon, 03/14/2022 - 12:44pm
Predictive Metrics
Router Systems Security
vpnot
vpn
tunnel
Transport Layer Security
Raspberry Pi
OpenVPN
integrity
Costs
Virtual private networks
Logic gates
Media
confidentiality
IoT
Resiliency
pubcrawl
encryption
Linux
authentication
sensors
security
biblio
Capturing Attacker Identity with Biteback Honeypot
Submitted by aekwall on Mon, 03/14/2022 - 12:43pm
Routing
feature extraction
pubcrawl
Resiliency
Routing protocols
Prototypes
Predictive Metrics
Virtual private networks
Portable document format
Biteback
honeypot
metasploit
Meterpreter
reverse TCP
Webcams
Router Systems Security
biblio
NetBot - An Automated Router Hardening Solution for Small to Medium Enterprises
Submitted by aekwall on Mon, 03/14/2022 - 12:42pm
information security
Organizations
machine learning algorithms
network security
pubcrawl
Resiliency
Predictive Metrics
automation
Virtual private networks
Compliance
Hardening
Rollback
router
virtual environments
vulnerability fixing
Router Systems Security
biblio
Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation
Submitted by grigby1 on Tue, 02/22/2022 - 12:23pm
Peer-to-peer computing
Virtual private networks
tools
telecommunication traffic
security
Scalability
Resiliency
resilience
pubcrawl
peer-to-peer security
peer to peer security
Peer-To-Peer
Metrics
IP networks
investigation
Human Factors
Evidence Detection
Digital Forensics
ADDIE Model
biblio
DoS Vulnerability Verification of IPSec VPN
Submitted by aekwall on Tue, 10/12/2021 - 2:08pm
IP networks
privacy
Servers
encryption
pubcrawl
composability
Compositionality
Routing protocols
policy-based governance
DoS
IKEv1 protocol
IPsec VPN
OSPF protocol
route spoofing
Virtual private networks
protocol verification
biblio
Global Internet Traffic Routing and Privacy
Submitted by grigby1 on Wed, 08/11/2021 - 3:02pm
internet
ip privacy
BGP Injection
MITM
Virtual private networks
SDN
delays
Routing
composability
IP networks
privacy
Resiliency
resilience
collaboration
policy-based governance
pubcrawl
Peer-to-peer computing
1
2
3
next ›
last »