Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Middleboxes
biblio
A Novel TCP/IP Header Hijacking Attack on SDN
Submitted by grigby1 on Fri, 02/17/2023 - 5:25pm
pubcrawl
resilience
Resiliency
Conferences
Scalability
computer security
SDN
Middleboxes
SDN security
TCPIP
Middlebox Security
TCP/IP hijacking
biblio
Multi-Layered CP-ABE Scheme for Flexible Policy Update in Industry 4.0
Submitted by grigby1 on Tue, 04/19/2022 - 4:40pm
CP-ABE
E2E security
embedded computing
Encapsulation
encryption
hybrid encryption
iiot
Industries
Industry 4.0
Middleboxes
policy-based governance
policy update
pubcrawl
Scalability
biblio
A Userspace Transport Stack Doesn't Have to Mean Losing Linux Processing
Submitted by grigby1 on Tue, 08/17/2021 - 3:58pm
composability
Ecosystems
Kernel
Linux
Linux operating system
Linux Operating System Security
Metrics
Middleboxes
pubcrawl
resilience
Resiliency
resource management
software defined networking
Throughput
biblio
Enabling Security Analysis of IoT Device-to-Cloud Traffic
Submitted by grigby1 on Mon, 08/02/2021 - 3:23pm
Cloud Computing
composability
data privacy
encryption
IoT security
Logic gates
Middleboxes
middleware
policy-based governance
privacy
Protocols
Prototypes
pubcrawl
resilience
Resiliency
Transport layer encryption
biblio
SUPC: SDN enabled Universal Policy Checking in Cloud Network
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
Protocols
virtualisation
Virtual private networks
SUPC
software defined networking
Software Defined Network (SDN)
Software Defined Network
SF rules
SF rule ordering overlaps
Service Function Chaining (SFC)
service function chain
Security Policy Conflicts
security breaches
SDN enabled universal policy checking
Resiliency
pubcrawl
Security Policies Analysis
policy conflicts
NFV
Network Function Virtualization (NFV)
network function virtualization
multitenant cloud networks
monitoring service functions
Middleboxes
Metrics
Firewalls (computing)
dynamic SFC composition
Dynamic Networks and Security
conflict checking mechanism
computer network security
composability
Cloud Computing
biblio
An SDN/NFV-Enabled Architecture for Detecting Personally Identifiable Information Leaks on Network Traffic
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
SDN/NFV-enabled architecture
NFV-enabled system
personally identifiable information detector
personally identifiable information leaks detection
privacy
privacy leaks
pubcrawl
resilience
Resiliency
SDN controllers
NFV MANO
Servers
social networking
software defined networking
software defined networking paradigm
software-based solutions
traffic intensity
unintended data disclosure
virtualisation
virtualization privacy
Human Factors
composability
computer architecture
computer network security
Data Breach
data breaches
data privacy
data-intensive nature
hardware-specific implementation
Human behavior
Cloud Computing
internet
leak detection
leak detection systems
load balancer
Measurement
Metrics
Middleboxes
network function virtualization
network traffic
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chain verification
security chains
security functions
model checking
smart devices
SMT
software defined networking
software-defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chains
security chain verification
security functions
model checking
smart devices
SMT
software-defined networking
software defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
NAT overflow attack
IPv6 middlebox
ipv6 security
Logic gates
Metrics
Middlebox
middlebox security problems
Middleboxes
Mobile handsets
NAT bricking attack
IPv6 cellular networks
NAT resources
NAT wiping attack
over-billing attacks
pubcrawl
Resiliency
security
stateful NAT64 boxes
TCP sequence number verification
telecommunication services
denial-of-service attacks
backward compatibility
cellular devices
cellular middleboxes
cellular network
Cellular networks
cellular operators
cellular radio
collaboration
composability
active NAT mappings
firewalls
IP address
IP networks
IP-based blacklisting
IPv4 address
IPv4 services
IPv6
IPv6 address
biblio
GroupSec: A new security model for the web
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
privacy
web security
Web Browser Security
Uniform resource locators
transport protocols
transparent content-caching
Servers
security of data
Resiliency
pubcrawl
Browsers
Middleboxes
Metrics
internet
Human behavior
HTTP
GroupSec security model
Cryptography
content group membership