Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtual private networks
biblio
Improvement of security and scalability for IoT network using SD-VPN
Submitted by aekwall on Mon, 06/17/2019 - 9:29am
Protocols
VxLAN based tunnels
VxLAN
VPN tunnels
Virtual private networks
Temperature control
Software-Defined Virtual Private Network solution
software defined networking
service chaining
security scalability
security
SDN controller
SDN
SD-VPN solution
SD-VPN
pubcrawl
automobiles
overlay VPN nature
overlay VPN
OpenvSwitch
OpenFlow protocol
OpenFlow
Logic gates
IP networks
IoT network security
IoT network scalability
IoT application
IoT
Internet of Things
computer network security
composability
biblio
Development of a Secure, Heterogeneous Cloud Robotics Infrastructure: Implementing a Mesh VPN and Robotic File System Security Practices
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
secure cloud robotics infrastructure
multipoint-to-multipoint virtual private network
onboard processing power
open-source system
OpenVPN
pubcrawl
Resiliency
Robot Operating System
robot programming
Robot sensing systems
robotic file system security practices
ROS
mobile robots
security
security of data
Servers
TurtleBot
Ubuntu
UFW
Virtual private networks
vpn
Windows
Windows Operating System Security
heterogeneous mobile robotic platforms
android
Android (operating system)
Cloud Computing
Cloud Robotics
composability
Compositionality
control engineering computing
file organisation
Heterogeneous
heterogeneous cloud robotics infrastructure
Operating systems security
Human Factors
Internet of Things
ios
iOS (operating system)
iOS Security
IoT
Linux
mesh VPN
Metrics
Microsoft Windows (operating systems)
biblio
A Content Auditing Method of IPsec VPN
Submitted by grigby1 on Wed, 11/14/2018 - 12:13pm
man-in-the-middle mechanism
Windows
VPN technology
Virtual private networks
Servers
Resiliency
resilience
public domain software
pubcrawl
prototype system
Protocols
operating systems (computers)
operating systems
microsoft windows
Metrics
encryption audits
IPv4 network environment
IPsec VPN users
IPsec VPN
IP networks
internet
encryption
DPDK technology
DPDK
default configuration
content auditing method
Compositionality
authentication
auditing
audit system
biblio
Secure the internet of things with challenge response authentication in fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 3:45pm
fog computing based security system
VPN server
Virtual private networks
virtual private network
Servers
security of data
security
IoT system
IoT devices
Internet of Things
authentication
Fog computing
FOCUS system
edge computing
distributed denial of service attacks
DDoS Attacks
computer network security
Computer crime
Cloud Computing
challenge-response authentication
biblio
Discovering and Mitigating New Attack Paths Using Graphical Security Models
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
resilience
zero-day vulnerabilities
Virtual private networks
UV-RAM
Universal Serial Bus
unified vulnerability risk analysis module
system components
Servers
security of data
Security analysis
security
risk analysis
Resiliency
Analytical models
pubcrawl
new attack path mitigation
new attack path discovery
network hardening
modern networked systems
mitigation strategies
Metrics
graphical security models
Databases
composability
attack graphs
biblio
A Security Analysis Method for Supercomputing Users \#x2019; Behavior
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
Protocols
Virtual private networks
supercomputing user behavior
supercomputing business process
Supercomputers
supercomputer
Security Policies Analysis
security of data
security level optimization
security level improvement
security incident detection
security analysis method
security
resource use tracking
pubcrawl
audit policy
policy-based governance
operation records
operating systems
mass storage
mainframes
log analysis
Linux
Human Factors
Correlation analysis
Correlation
complete user behavior path restoration
collaboration
business data processing
biblio
A model for the analysis of security policies in service function chains
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
pubcrawl
virtualisation
Virtual private networks
software tools
software defined networking
Software
SFC
service function chains
Security Policies Analysis
security policies
SDN
Ad hoc networks
program verification
policy-based governance
NFV
network function virtualization
Monitoring
formal model
Cryptography
computer network security
collaboration
Analytical models
biblio
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
Resiliency
vpn
Virtual private networks
uncontrolled networks
transport protocols
transport capacity
traffic pattern automatic adjustment
traffic normalization
Traffic analysis
telecommunication traffic
telecommunication network topology
telecommunication congestion control
TCP flows
Scalability
Bandwidth
rate-based congestion control mechanism
pubcrawl
Packet loss
overlay topology
overlay networks
network congestion avoidance
Logic gates
local network testbed
Cryptography
covert-channel-resistant congestion control
covert channels
Compositionality
biblio
"Towards dependable CPS infrastructures: Architectural and operating-system challenges"
Submitted by abfox on Tue, 02/14/2017 - 1:33pm
advanced persistent threat
computer architecture
CPS infrastructure
cyber-physical system
cyber-physical systems
Kernel
Linux
operating systems (computers)
operating-system level
pubcrawl170101
rudimentary solution
security
security of data
Virtual private networks
« first
‹ previous
1
2
3