Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vpn
biblio
VPNoT: End to End Encrypted Tunnel Based on OpenVPN and Raspberry Pi for IoT Security
Submitted by aekwall on Mon, 03/14/2022 - 1:44pm
Predictive Metrics
Router Systems Security
vpnot
vpn
tunnel
Transport Layer Security
Raspberry Pi
OpenVPN
integrity
Costs
Virtual private networks
Logic gates
Media
confidentiality
IoT
Resiliency
pubcrawl
encryption
Linux
authentication
sensors
security
biblio
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
emergency response networks
Compositionality
Network
emergency management
emergency services
building mobile device trust
building resiliency
communication utility patterns
crowd sensing
Buildings
MACH 2K
MACH-2K trust overlay network architecture
message confidentiality
Mobile handsets
private mobile devices
public service networks
vpn
manet privacy
pubcrawl
architecture
Cryptography
data privacy
Organizations
telecommunication security
History
computer architecture
Resiliency
security
overlay networks
Peer-to-peer computing
Metrics
trust
Ad hoc networks
MANET
mobile ad hoc networks
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
open source Virtual Private Network
WireGuard virtual private network protocol
vpn
Virtual private networks
verification
transport data messages
standards
security protocols
pubcrawl
Protocols
protocol verification
privacy
policy-based governance
Policy Based Governance
authorisation
Noise Protocol Framework
IP networks
Elliptic curve cryptography
CryptoVerif proof assistant
Cryptographic Protocols
cryptographic protocol
cryptographic proof
computer network security
computational model
Compositionality
composability
collaboration
biblio
Development of a Secure, Heterogeneous Cloud Robotics Infrastructure: Implementing a Mesh VPN and Robotic File System Security Practices
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
secure cloud robotics infrastructure
multipoint-to-multipoint virtual private network
onboard processing power
open-source system
OpenVPN
pubcrawl
Resiliency
Robot Operating System
robot programming
Robot sensing systems
robotic file system security practices
ROS
mobile robots
security
security of data
Servers
TurtleBot
Ubuntu
UFW
Virtual private networks
vpn
Windows
Windows Operating System Security
heterogeneous mobile robotic platforms
android
Android (operating system)
Cloud Computing
Cloud Robotics
composability
Compositionality
control engineering computing
file organisation
Heterogeneous
heterogeneous cloud robotics infrastructure
Operating systems security
Human Factors
Internet of Things
ios
iOS (operating system)
iOS Security
IoT
Linux
mesh VPN
Metrics
Microsoft Windows (operating systems)
biblio
Realizing a Virtual Private Network Using Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 3:36pm
Human behavior
IPsec
Named Data Network Security
named data networking
pubcrawl
resilience
Resiliency
Scalability
vpn
biblio
A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security
Submitted by grigby1 on Wed, 02/21/2018 - 1:42pm
SQL injection
Agent
Brute force
CFG
DDoS
Force
IP networks
Network Security Architecture
password
pubcrawl
resilience
Resiliency
Servers
vpn
biblio
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
Resiliency
vpn
Virtual private networks
uncontrolled networks
transport protocols
transport capacity
traffic pattern automatic adjustment
traffic normalization
Traffic analysis
telecommunication traffic
telecommunication network topology
telecommunication congestion control
TCP flows
Scalability
Bandwidth
rate-based congestion control mechanism
pubcrawl
Packet loss
overlay topology
overlay networks
network congestion avoidance
Logic gates
local network testbed
Cryptography
covert-channel-resistant congestion control
covert channels
Compositionality
biblio
A Systematic Analysis of the Juniper Dual EC Incident
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
composability
dual EC DRBG
Elliptic curve cryptography
Elliptic curve cryptography (ECC)
juniper
Metrics
pseudorandom number generator
pubcrawl
Resiliency
vpn
biblio
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
Submitted by grigby1 on Tue, 05/30/2017 - 12:41pm
ads blocking
collaboration
composability
dns hijacking
hidden proxies
IPv6
ipv6 security
javascript injection
Metrics
pubcrawl
Resiliency
tls interception
tunneling protocols
vpn
vpn permission