Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
dynamic networks
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chains
security chain verification
security functions
model checking
smart devices
SMT
software-defined networking
software defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
Enhancing SDN Security for IoT-Related Deployments through Blockchain
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
resilience
IoT
IoT clouds
IoT-related deployments
jurisdictional boundaries
Metrics
national boundaries
network reconfiguration
networking paradigm
policy enforcement
pubcrawl
recently introduced Blockchain paradigm
render Blockchain
Internet-of-Things-related networking elements
Resiliency
safety-critical applications
SDN
SDN security
security
significant security factor
software defined networking
Switches
thorny issue
traditional networking deployments
Virtualization
cross national boundaries
blockchain security
Business
business activity
cloud
Cloud Computing
cloud computing infrastructure
composability
computer network security
Conferences
connected nodes
connected world
blockchain
dynamic manner
dynamic networks
efficient entity interconnection
efficient monitoring
emerging networking paradigm
geographic boundaries
increased attack surface
integrated world
intercloud communication
internet
Internet of Things
biblio
An Information Security Risk Assessment Algorithm Based on Risk Propagation in Energy Internet
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
partitions
threat propagation effect
security of data
security
RM algorithm
risk management
risk analysis
Resiliency
resilience
pubcrawl
propagation risk value
propagation effect
power systems
power engineering computing
composability
Nickel
Metrics
matrix algebra
logical network location
ISRADRP
internet
information system
information security risk assessment algorithm
information security risk assessment
energy internet
Dynamic Risk Propagation
dynamic networks
Dependency Structure Matrix
biblio
Models of Information Security Risk Accounting in Metrics of Dynamic Routing Protocols
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
pubcrawl
transmitted information
Telecommunications
security
Routing protocols
routing metrics
Routing
Resiliency
resilience
quality of service
QoS indicators
composability
Metrics
Measurement
information security risk indicator
information security risk accounting
information security risk
dynamic routing protocols
dynamic networks
computing metrics
computer science
computer network security
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Security Comparison between Dynamic Static WSN for 5g Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:10pm
Power demand
WSN
wireless sensor networks
vehicle dynamics
Static Network
security
Resiliency
resilience
pubcrawl
5G
power consumption
Monitoring
Metrics
energy consumption
dynamic networks
Dynamic Network
composability
5G mobile communication
biblio
Research on Network Security Protection System Based on Dynamic Modeling
Submitted by grigby1 on Mon, 03/05/2018 - 1:10pm
password
vulnerability risk model
standards
security
safety evaluation model
risk model of intrusion event
Resiliency
resilience
pubcrawl
authentication
network protection system
Metrics
dynamic networks
composability
Companies
Communication networks
Biological system modeling
biblio
A New Reliability-Driven Intelligent System for Power System Dynamic Security Assessment
Submitted by grigby1 on Mon, 03/05/2018 - 1:10pm
Artificial Neural Networks
composability
dynamic networks
feature extraction
Metrics
neural networks security
power system stability
Power system transients
Prediction algorithms
pubcrawl
resilience
Resiliency
security
Stability analysis
Training
biblio
Towards comprehensive protection for OpenFlow controllers
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
Cross Layer Security
Virtual machine monitors
telecommunication control
security
Resiliency
pubcrawl
operating systems
OpenFlow critical component
OpenFlow controller
malicious controller
Industrial Control Systems
dynamic networks
adaptive networks
cross layer diversity
control systems
control plane-data ploane decoupling
control logic
computer network security
Computer bugs
computer architecture
composability
Attack vectors
agile networks
biblio
Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs
Submitted by grigby1 on Mon, 05/22/2017 - 2:06pm
Human behavior
typed graphs
Time Frequency Analysis
threat vectors
temporal networks
streamspot
security
Scalability
Resiliency
pubcrawl
Metrics
advanced persistent threat
heterogenous graphs
graph sketches
evolving graphs
edge detection
dynamic networks
composability
Attack vectors
attack graphs
Anomaly Detection
« first
‹ previous
1
2
3
4
5
6
next ›
last »