Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security by Default
biblio
Q-DATA: Enhanced Traffic Flow Monitoring in Software-Defined Networks applying Q-learning
Submitted by aekwall on Mon, 04/13/2020 - 9:07am
SDN controllers
forwarding performance status
Network Statistics and Software-Defined Networking
optimal traffic flow matching policy
policy formulation
proactive forwarding device protection
Q-DATA framework
Q-learning algorithm
Reinforcement learning
reinforcement learning approach
REST SDN application
SDN based networks
Degradation
SDN environment
SDN switches
SDN-based traffic flow
SDN-based traffic flow matching control system
support vector machine based algorithm
traffic flow granularity
traffic flow information
traffic flow monitoring
traffic forwarding performance degradation protection
Security by Default
control systems
Monitoring
Scalability
telecommunication traffic
computer network management
software defined networking
Support vector machines
learning (artificial intelligence)
Resiliency
pubcrawl
software-defined networking
computer network security
Security analysis
Software-Defined Networks
computer network reliability
data plane
centralised control
centralized network control
centralized network management
control framework
control plane
Control System
biblio
Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)
Submitted by aekwall on Mon, 04/13/2020 - 9:07am
Local area networks
Security by Default
Software Defined Perimeter
SD-WAN
SD-Node
machine-to-machine communications
machine-to-machine communication
M2M devices
industrial Internet of Things for Critical Infrastructure
industrial application
IIoT-CI
wide area networks
Software Defined Networks
computer network security
SDN
risk management
pubcrawl
Resiliency
critical infrastructure
software defined networking
Software
Protocols
security
Internet of Things
Scalability
ddos mitigation
biblio
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
End user Studies
Security by Default
User Perception
usable security and privacy
skilled attackers
signal protocol
secure messaging
pre-MME
pre-mass messenger encryption
post-MME
post-mass messenger encryption
Mental model
HCI
end-to-end encryption
Scalability
communication model
cognitive science
end-to-end security
whatsapp
authentication
Interviews
electronic messaging
pubcrawl
Resiliency
Protocols
data privacy
encryption
Cryptography
biblio
Network Security Monitoring (NSM): Can it be Effective in a World with Encrypted Traffic?
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Scalability
Resiliency
pubcrawl
MITM
HTTPs
Network Security Monitoring
SNI
SSL/TLS
Security by Default
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
biblio
Detect Me If You… Oh Wait. An Internet-Wide View of Self-Revealing Honeypots
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Open Source Software
Security by Default
simple signature-based detection
self-revealing honeypots
mail server
Internet-wide view
hosting networks
government incentive
FTP mirror
default open-source honeypots
cloud network
Censys scan data
attack monitoring
computer network security
IoT device
digital signatures
Market research
tools
internet
Statistics
Sociology
pubcrawl
Resiliency
security
Servers
Scalability
biblio
Towards Privacy in Geographic Message Dissemination for Connected Vehicles
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
legal regulations
Security by Default
vehicle routing
traffic information systems
traffic information
space-filling curves
server infrastructure
Routing
road traffic
privacy-by-design principle
privacy-by-design
privacy-by-default principle
location updates
location based services
road safety
geographic relevance area
geographic message dissemination
consistent hashing
connected vehicles
Traffic Management
user privacy
client-server systems
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
biblio
Development of IIoT Monitoring and Control Security Scheme for Cyber Physical Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:05am
security
Monitoring
Scalability
Internet of Things
Protocols
Resiliency
pubcrawl
Fans
CPS
Network
Heating systems
iiot
Security by Default
biblio
SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps
Submitted by aekwall on Mon, 04/13/2020 - 9:05am
Security by Default
User Ratings
trust
subjective logic
static taint analysis
smart phones
smart mobile devices
SERS
sentiment analysis
security-related internal aspect
security-related comments
security-related and evidence-based ranking scheme
security of data
app distribution platforms
security
Scalability
Resiliency
ranking
pubcrawl
mobile computing
Mobile Apps
Measurement
Google PlayStore
Google
Databases
Data mining
biblio
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:40am
Scalability
middleware
Network reconnaissance
open systems
Peer-to-peer computing
permission attestation
Predictive Metrics
Protocols
pubcrawl
realtime peer-to-peer protocol
Resiliency
leaked context
scalable middleware
scalable verification
secure DDS systems
Secure DDS v
security
Security by Default
security model
Service Plugin Interface architecture
vulnerability excavation
default plugin specifications
authenticated encryption
authorisation
capability lists
Compositionality
crypto handshake
Cryptography
data bus
data centric access control
Data Distribution Service
attacker model
digital signatures
distributed networked systems
electronic data interchange
formal verification
Industrial IoT
initial ratification
internet
interoperable data exchange
IoT protocol
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »