Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Configuration Management
biblio
Research on the Configuration Management of Complex Equipment Based on Identity Resolution
Submitted by aekwall on Fri, 09/30/2022 - 2:38pm
Scalability
pubcrawl
Resiliency
Human behavior
Industries
Data collection
Correlation
Identity management
Configuration Management
distributed processing
identity resolution
industrial internet
intelligent databases
Packaging
Rail transportation
biblio
Supply Chain Risk Management
Submitted by willirn1 on Fri, 10/22/2021 - 11:34am
advanced cyber threat
Configuration Management
emerging threat
materiel
program protection plan
risk management
Supply Chain
systems engineering process
biblio
Automated Implementation of Windows-related Security-Configuration Guides
Submitted by grigby1 on Thu, 06/24/2021 - 11:26am
pubcrawl
Operating systems security
Resiliency
resilience
composability
Metrics
Automated Secure Software Engineering
Configuration Management
Data mining
Manuals
natural language processing
operating systems
Organizations
security
Task Analysis
biblio
Coordinated autonomic loops for target identification, load and error-aware Device Management for the IoT
Submitted by grigby1 on Thu, 06/24/2021 - 10:53am
Autonomic Security
composability
Configuration Management
device management
firmware update
Internet of Things
multiple loop cooperation
pubcrawl
resilience
Resiliency
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
A Programmable Network Management Architecture for Address Driven Network
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
network management
YANG
REST APIs
programmable network management architecture
network protocols
network management functions
NETCONF
innovative network architecture
flexible management
Configuration Management
address driven network
Network Security Architecture
network services
computer network security
application program interfaces
Load modeling
Routing
pubcrawl
Resiliency
network security
Data models
computer network management
Protocols
security
IP networks
biblio
Mining Software Repositories for Predictive Modelling of Defects in SDN Controller
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
predictive modelling
Stochastic processes
software release management
software metrics
software development management
software defined networking control plane
software defined networking
software defect metrics
Software
security
Reliability
public domain software
pubcrawl
Protocols
program debugging
production grade SDN controller
predictive security metrics
OpenDaylight architecture
open source SDN controller platform
network operating system
mining software repositories
Metrics
Git version control system
Data mining
control systems
Configuration Management
computer network management
Computer bugs
bug repository
bug removal rates
bug manifestation
bug characteristics
biblio
Integrating visual analysis of network security and management of detection system configurations
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
collaboration
Communication networks
Configuration Management
Data models
Databases
Intrusion Detection
Intrusion Detection Systems
Monitoring
network security
policy evaluation
policy-based governance
pubcrawl
Security Policies Analysis
Security Visualization
visualization