Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network communications
biblio
An Adaptive Telerobotics Control for Advanced Manufacturing
Submitted by grigby1 on Tue, 12/15/2020 - 12:43pm
locally operated robots
camera device
compact reliable UDP
compact-RUDP
connection reliability
control arhitecture
cutting tool
cutting tools
data channelling
data communication reliability
data feedback packets
data packet transfer prioritization
Distributed Decision Making
file transfers
industrial manipulators
link status monitoring
bandwidth control
Machining
network communications
reliable operational process
Remote control
remotely operated robots
robot movements
robot teleoperation
round-trip time
TCP-like sliding window
teleoperation
telerobotics reasoning architecture
telerobotics reasoning networking
UDP packets
video stream
robot operating systems
Path Planning
pubcrawl
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
mobile robots
security
Protocols
control engineering computing
production engineering computing
media streaming
Data Security
Reliability
control commands
Servers
telecommunication network reliability
Robot sensing systems
telerobotics
light sensor
transport protocols
video streaming
robot vision
image sensors
5DOF robotic arm
adaptable operational process
adaptive telerobotics control
advanced manufacturing
advanced robot path planning
asynchronous file transfer
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 11:13am
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 11:15am
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
TARN: A SDN-based traffic analysis resistant network architecture
Submitted by K_Hooper on Wed, 05/09/2018 - 9:52am
Scalability
network communications
Open vSwitches
PEERING BGP testbed
Peer-to-peer computing
pseudorandom IP addresses
pubcrawl
Resiliency
Routing
Routing protocols
large-scale traffic analysis resistant network support
SDN
SDN security
SDX solution
Software
software defined networking
TARN
telecommunication traffic
traffic analysis resistant network architecture
YouTube
Hidden Markov models
computer network security
customer-driven network services
customizable trustable end-to-end network services
destination IP prefix
destination networks
distributed software defined Internet exchange
DNS/IP filtering
end-to-end communication session
end-to-end network services
business model
intended destination AS's prefix
internet
Internet autonomous systems
Internet routing
IP addressing freedom
IP networks
IP prefixes
IPv4
IPv6
biblio
SDN Security Plane: An Architecture for Resilient Security Services
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
SDN security plane
pubcrawl
real-time user-defined security
remotely controlled network
Resiliency
Resilient Security Architectures
resilient security services architecture
SDN
SDN controller
SDN security design
Proposals
SDN switches
Security plane
security-related data exchange
software defined networking
telecommunication control
telecommunication switching
third party agent
third party software module
data plane
centralised control
centralized control
computer architecture
Computer crime
computer network performance evaluation
computer network security
control plane
control systems
data packet forwarding
Agent
DDoS Attack Prevention
DDoS Attacks
IP networks
network communications
network performance
network security features
OpenFlow
Ports (Computers)
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols