Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
security
Software
pubcrawl
Scalability
Resiliency
Human behavior
Probes
side-channel attacks
Data mining
Multicore processing
computer architecture
ping-pong regulator
Regulators
side channel attacks
pattern locks
biblio
Transport Network Slices with Security Service Level Agreements
Submitted by grigby1 on Thu, 09/30/2021 - 2:38pm
computer architecture
IP networks
Monitoring
Network Security Architecture
network slicing
pubcrawl
quality of service
real-time systems
resilience
Resiliency
security
biblio
Attack Detection on the Software Defined Networking Switches
Submitted by grigby1 on Thu, 09/30/2021 - 2:37pm
computer architecture
Monitoring
Network Security Architecture
pubcrawl
resilience
Resiliency
security
security application
security attacks
Software
Software Defined Networking (SDN) Security
Switches
Switch Security
Task Analysis
biblio
Securing Internet of Things System Using Software Defined Network Based Architecture
Submitted by grigby1 on Thu, 09/30/2021 - 2:37pm
computer architecture
DDoS
Internet of Things
Internet of Things (IoT)
Network Security Architecture
network slicing
pubcrawl
Radio frequency
resilience
Resiliency
security
software defined networking
Software Defined Network (SDN)
software reliability
biblio
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis
Submitted by grigby1 on Thu, 09/30/2021 - 2:37pm
Monitoring
Virtualization
Trusted Execution Environment
Trusted Computing Base (TCB)
TEE
security
Resiliency
resilience
pubcrawl
Network Security Architecture
AMD Secure Processor
Isolation technology
Intel SGX
Intel ME
Hardware-assisted isolation
Hardware
Cryptography
computer architecture
ARM TrustZone
biblio
A Method for Constructing Heterogeneous Entities Pool in NFV Security Architecture Based on Mimic Defense
Submitted by grigby1 on Thu, 09/30/2021 - 2:37pm
computer architecture
Conferences
genetic algorithm
genetic algorithms
heterogeneous entities pool
mimic defense
network function virtualization
Network Security Architecture
pubcrawl
resilience
Resiliency
resource management
security
simulation
biblio
A Security-Aware Software-Defined IoT Network Architecture
Submitted by grigby1 on Thu, 09/30/2021 - 2:36pm
computer architecture
Internet of Things
network architecture
network security
Network Security Architecture
pubcrawl
resilience
Resiliency
security
simulation
Software Defined Networks
standards
Systems architecture
biblio
A New Network Security Architecture Based on SDN / NFV Technology
Submitted by grigby1 on Thu, 09/30/2021 - 2:36pm
Cloud Computing
Communication networks
computer architecture
network function virtualization
Network Security Architecture
pubcrawl
resilience
Resiliency
security
Security Service Function Path
Software
Software Defined Network
Software Defined Security
Switches
Virtualization
virtual security function
biblio
NSNN Algorithm Performance with Different Neural Network Architectures
Submitted by aekwall on Thu, 09/30/2021 - 11:53am
Biological neural networks
negative selection
Immune system
Neural Network Security
intrusion detection system
Neural networks
Neurons
Classification algorithms
policy-based governance
IoT
Artificial Neural Networks
cyber-physical systems
Resiliency
Metrics
pubcrawl
Intrusion Detection
computer architecture
biblio
A Secure Network Interface for on-Chip Systems
Submitted by aekwall on Thu, 09/30/2021 - 11:42am
lED
network on chip security
VHDL
Network interfaces
network interface
Multicore processing
Hardware Implementation
decryption
network-on-chip
light emitting diodes
security
Ciphers
AES
Resiliency
Metrics
Scalability
pubcrawl
encryption
tools
computer architecture
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »