Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security techniques
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 1:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
Enhanced Uptime and Firmware Cybersecurity for Grid-Connected Power Electronics
Submitted by aekwall on Mon, 02/17/2020 - 1:22pm
hardware-assisted monitor
distributed energy resource prototype
embedded Linux
encrypted serial communication
firmware cybersecurity
firmware integrity
firmware run-time integrity security
firmware run-time security feature
firmware updating
Grid Security
grid-connected power electronics
digital signal processors
Heart beat
multi-mission controls
operational technology security
power electronics security
power electronics uptime
power flow
run-time security
security techniques
uptime
firmware
Monitoring
Hardware
security
Linux
Resiliency
pubcrawl
composability
Metrics
Cybersecurity
privacy
security of data
power engineering computing
power system security
control systems
power grids
signal processing security
digital signal processing chips
Microprogramming
power electronics
security features
biblio
DRIVE: Dynamic Runtime Integrity Verification and Evaluation
Submitted by K_Hooper on Wed, 05/02/2018 - 9:48am
drive
Human behavior
integrity verification
Metrics
pubcrawl
Scalability
security techniques
Tamper resistance
biblio
Security techniques for the WSN link layer within military IoT
Submitted by grigby1 on Mon, 11/13/2017 - 10:59am
Resiliency
WSN link layer
wireless sensor networks
trusted platform modules
Trusted Platform Module
telecommunication security
sensor nodes
security techniques
security
composability
pubcrawl
military communication
military applications
Internet of Things
fault tolerant sensor network
energy resources
Cryptography
cryptographic protection