Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Router Systems Security
biblio
A Group Key Management Protocol for Mobile Devices
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
Router Systems Security
composability
Diffie-Hellman Key Exchange Protocol
Group key management
Metrics
pubcrawl
resilience
wireless mesh networks
biblio
Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code
Submitted by grigby1 on Mon, 12/10/2018 - 11:39am
Brute-force Attack
composability
defense
IoT device
Metrics
pubcrawl
resilience
Resiliency
Router Systems Security
SMS authentication code
user account
Zero day attacks
biblio
A Trust Management Framework for Network Applications within an SDN Environment
Submitted by grigby1 on Wed, 05/09/2018 - 3:02pm
pubcrawl
Trusted Computing
Trust management
trust
software defined networking
security
SDN environment
SDN
Router Systems Security
Router Systems
Resiliency
resilience
Reliability
Aerospace electronics
Ports (Computers)
network resources
network behaviour
network applications
Metrics
control systems
computer network security
authorization
authorisation permissions
authorisation
authentication
biblio
Visiting Mobile Node Authentication Protocol for Proxy MIPv6-Based NEtwork MObility
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
PMIPv6
VMN
Visiting Mobile Nodes
telecommunication network routing
Servers
security
Router Systems Security
Router Systems
Resiliency
resilience
pubcrawl
Proxy MIPv6-Based NEtwork MObility
Protocols
authentication
NEMO-BSP
NEMO-Basic Support Protocol
NEMO
mobility management (mobile radio)
mobile router
mobile radio
mobile nodes
mobile node authentication protocol
Metrics
Handover
Cryptographic Protocols
AVISPA
biblio
DAS: An Efficient NoC Router for Mixed-Criticality Real-Time Systems
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
NoC router
worst-case communication latency
wormhole and store and forward technique
Wormhole
virtual channel
Switches
Store And Forward
Software
security
Router Systems Security
Router Systems
Resiliency
resilience
real-time systems
pubcrawl
Ports (Computers)
computer architecture
network-on-chip
network use rate
network routing
multiprocessing systems
multiple virtual channels
mixed-criticality systems
Metrics
MCS
low-critical flow
high-critical flows
double arbiter and switching router
delays
DAS
cycle-accurate SystemC NoC simulator
biblio
The Waterfall of Liberty: Decoy Routing Circumvention That Resists Routing Attacks
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
censorship circumvention
decoy routing
internet censorship
Metrics
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
routing attacks
security
biblio
From Fingerprint to Footprint: Revealing Physical World Privacy Leakage by Cyberspace Cookie Logs
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
cookie
CPS Privacy
cyber-physical systems
I-O Systems
Metrics
privacy
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
security
trajectories
biblio
Implementing Geo-Blocking and Spoofing Protection in Multi-Domain Software Defined Interconnects
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
Geo-Blocking
Internet Exchange Point
Metrics
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
security
Security Intents
software defined networking
biblio
The Devil's in The Details: Placing Decoy Routers in the Internet
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
Anti-Censorship
decoy routing
Internet topology
Metrics
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
security
Traceroute
biblio
Arav: Monitoring a Cloud's Virtual Routers
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
Cloud Security
Metrics
pubcrawl
resilience
Resiliency
Router Systems
Router Systems Security
security
virtual machine introspection
virtual routers
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »