Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
openstack
biblio
An Information-centric NFV-based System Implementation for Disaster Management Services
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
mobile rescue operations
disaster recovery phase
flexible rescue group communication
ICN
information centric disaster management
information-centric disaster management system
information-centric network management
information-centric NFV-based system implementation
IP-based approach
low communication overhead
Disaster management
name-based interest-oriented communication approach
ndn nfv
network fragmentation
network infrastructure management
Seoul disaster management services
system implementation
Telephony
vICSNF
law enforcement
Scalability
virtualisation
computer network management
Resiliency
pubcrawl
internet
network topology
Topology
IP networks
Information Centric Networks
network function virtualization
container
hospitals
Gold
emergency management
openstack
connection-oriented communication
biblio
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
openstack
user interfaces
security policies
security of data
security
Runtime
Resiliency
pubcrawl
proactive security verification
privacy
policy-based governance
pluggable interface
PERMON
openstack middleware
Access Control
network accountability
Monitoring
middleware security
middleware
Metrics
Event Interception
Conferences
composability
Cloud Security
cloud runtime security policy enforcement
cloud providers
cloud environment accountability
Cloud Computing
biblio
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
Onos
traffic flow integrity
telecommunication traffic
software defined networking technology
software defined networking
SDN security
SDN data layer devices
SDN controller security
Scalability
Resiliency
resilience
pubcrawl
OpenStack platform
openstack
Onos controller
BCFR solution
network elements
network development
network communication security challenges
internet
injection
global network
false flow rules
false flow rule injection
Cryptography
controller authentication
computer network security
blockchain-based controller
blockchain technology
blockchain
biblio
Openstack: Launch a Secure User Virtual Machine Image into a Trust Public Cloud IaaS Environment
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
tpm
policy-based governance
pubcrawl
Resiliency
Scalability
secure launch user VMI
secure user virtual machine image
security
security policy
Software
openstack
trust cloud environment
trust public cloud IaaS environment
Trusted Computing
user VMI requirements
virtual machine security
virtual machines
Virtual machining
VMI
Cryptography
cloud computing architecture
Cloud Management Platforms
cloud-delivered model
CMP
Computational modeling
computer architecture
confidentiality
cryptographic techniques
Cloud Computing
cryptology
enhanced TPM remote attestation
Human behavior
IaaS
IaaS classical processes
infrastructure-as-a-service
Launch
Metrics
biblio
On the Universally Composable Security of OpenStack
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Cloud Security
composability
Modular Security Analysis
openstack
pubcrawl
universal composability
biblio
Leveraging OpenStack and Ceph for a Controlled-Access Data Cloud
Submitted by grigby1 on Fri, 02/08/2019 - 4:33pm
Ceph
Cloud Computing
dbGaP
Docker
Human behavior
Human Factors
openstack
private cloud
Protected Data
pubcrawl
S3
two factor authentication
biblio
Taking Control of SDN-Based Cloud Systems via the Data Plane
Submitted by grigby1 on Fri, 02/08/2019 - 4:31pm
openstack
Virtual Switches
SDN security
SDN
Scalability
rop attacks
ROP
Resiliency
resilience
pubcrawl
Packet Parsing
attack surface
Open vSwitch
NFV
network virtualization
Network Isolation
MPLS
Metrics
data plane security
Cloud Security
Attacker Models
biblio
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
side channel attacks
network channel attacks
network traffic
openstack
physical machine
privacy
pubcrawl
Resiliency
security
security requirements
Network Channel Attack
Switches
TAP impersonation
Virtual machine monitors
virtual machines
virtualisation
virtualization privacy
virtualization services
VM-to-VM interference
internal cloud virtual network
Cloud Computing
cloud platform
co-located VMs
co-resident VMs
composability
computer network security
cross-Virtual machine network channel attack
data privacy
Human behavior
Bridges
internal virtual network
IP networks
logical resource isolation
malicious VM
Metrics
mirroring
Monitoring
multitenant virtualized cloud environments
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
Game-theory based detection and prevention of DoS attacks on networking node in open stack private cloud
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
openstack
vulnerability detection
Virtualization
Virtual machining
Stochastic game
Stochastic Computing Security
Servers
security
Resiliency
pubcrawl
cloud
Metrics
IP networks
Human behavior
Games
Game-Theory
DoS attack
DHCP attack
Compositionality
Cloud Computing
1
2
next ›
last »