Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ipv6 security
biblio
Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
large-scale modifications
unsatisfactory deployability
Resiliency
resilience
Receivers
pubcrawl
Protocols
private proposal
privacy
policy-based governance
Payloads
PAVI prototype
Observers
network accountability
Metrics
accountability
ipv6 security
IPv6 Internet
IPv6
IP networks
internet
data privacy
computer network security
composability
communication identifiers
collaboration
bootstrapping privacy
bootstrapping accountability
authentication
accountable proposal
biblio
Research on the IPv6 Technical Defects and Countermeasures
Submitted by grigby1 on Tue, 01/21/2020 - 12:07pm
ipv6 security
transport protocols
TCP/IP protocol cluster
Spliced Address
security
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network topology
Metrics
IPv6 technical defects
IPv6 spliced address
Big Data
IPv6 interface ID
IPv6 address structure design ideas
IPv6
IPv4 Upgrading
IPv4
IP networks
internet
Interface ID
global Internet
composability
collaboration
cloud storage
Cloud Computing
biblio
Moving Target Defense Intrusion Detection System for IPv6 based smart grid advanced metering infrastructure
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
Ports (Computers)
Training
static based attack detection techniques
smart power grids
smart meters
Smart Grids
smart grid IPv6 based advanced metering infrastructure
smart grid communications
smart grid advanced metering infrastructure
Smart Grid
security of data
Routing
Resiliency
pubcrawl
power system measurement
collaboration
Planar Key
object detection
network traffic
moving target defense intrusion detection system
moving target defense
Metrics
MATLAB
ipv6 security
IP networks
Intrusion Detection Systems
Intrusion Detection
Difference Plane
composability
biblio
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
NAT overflow attack
IPv6 middlebox
ipv6 security
Logic gates
Metrics
Middlebox
middlebox security problems
Middleboxes
Mobile handsets
NAT bricking attack
IPv6 cellular networks
NAT resources
NAT wiping attack
over-billing attacks
pubcrawl
Resiliency
security
stateful NAT64 boxes
TCP sequence number verification
telecommunication services
denial-of-service attacks
backward compatibility
cellular devices
cellular middleboxes
cellular network
Cellular networks
cellular operators
cellular radio
collaboration
composability
active NAT mappings
firewalls
IP address
IP networks
IP-based blacklisting
IPv4 address
IPv4 services
IPv6
IPv6 address
biblio
Threats and surprises behind IPv6 extension headers
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
Metrics
telecommunication traffic
standards
security
Resiliency
quality of experience
pubcrawl
Protocols
Probes
Payloads
Monitoring
collaboration
legitimate traffic
ipv6 security
IPv6
IP networks
Internet threats
internet
extension headers
end-user QoE
computer network security
composability
biblio
A comparison of migration and multihoming support in IPv6 and XIA
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
quality of service
Mobility
mobility anchor point
mobility management (mobile radio)
multihomed hosts
multihoming
optimization
protocol messages
Protocols
pubcrawl
mobile radio
Resiliency
resource allocation
Routing
Routing protocols
telecommunication network routing
telecommunication security
wireless LAN
XIA
XIA Migration Protocol
IP networks
client mobility
collaboration
composability
computer network management
fault tolerance
flow migration support
flow-level migration
heavy-weight protocol
internet
allocative efficiency
IPv6 address
IPv6 multihoming solutions
ipv6 security
Metrics
Mobile communication
mobile computing
Mobile IPv6
Mobile IPv6 Enhanced Route Optimization
biblio
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
obscuration technique
Logic gates
Metrics
moving target defense
moving target IPv6 defense
MT6D processor
network address
network infrastructure
network level
network packet processor
network processor
network time protocol listener
keyed access
operating system kernel
operating system kernels
personal area networks
Protocols
pubcrawl
Register Transfer Level network security processor implementation
Resiliency
Routing protocols
RTL development
system architectural design
system level functions
federal networks
application specific integrated circuits
ASIC
CISC architecture
Clocks
collaboration
complex instruction set computer architecture
composability
computer network security
cryptographic dynamic addressing
Encapsulation
Engines
application specific integrated circuit variant
FPGA
Hardware
hardware engine
HE-MT6D
Homeland Security Cyber Security Division
IEEE 802.3 Ethernet
Instruction sets
internet
IP networks
IPv6
ipv6 security
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
biblio
A Security Routing Protocol for Internet of Things Based on RPL
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
RPL network security
Resiliency
route discovery phase
Routing
Routing attack
routing attacks
Routing protocols
routing recurity
RPL based security routing protocol
pubcrawl
security
security problems
security routing protocol
telecommunication network topology
telecommunication security
test network
test prototype network
Topology
IP networks
collaboration
composability
data routing
flexible topological structure
hierarchical clustering network topology
intelligent device
Internet of Things
IoT
backup path
ipv6 security
lightweight IPv6 network routing protocol
Logic gates
M-RPL network
Metrics
multipath routing
network topology
biblio
Neighbor-Passive Monitoring Technique for Detecting Sinkhole Attacks in RPL Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
6LoWPAN
collaboration
composability
Internet of Things
intrusion detection system
ipv6 security
Metrics
pubcrawl
Resiliency
RPL
Sinkhole attack
WSN
« first
‹ previous
1
2
3
4
5
next ›
last »