Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
biblio
An architecture to manage security services for cloud applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Software
management practice
network services
operation models
Security architectures
security orchestrator
security perimeter
security services
service orchestration
Inspection
software orchestration
Topology
ubiquitous computing
virtual functions
Virtualization
Pervasive Computing Security
Human Factors
security
cyber-security paradigms
cyber-security architecture
cloud-based distributed applications
cloud technologies
cloud application
Human behavior
resilience
Resiliency
Metrics
pubcrawl
computer architecture
Scalability
Monitoring
Cloud Computing
security of data
biblio
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
Protocols
learning (artificial intelligence)
Local area networks
modern industrial control systems
Policy Based Governance
policy-based governance
privacy
protocol frame structures
protocol frames
protocol verification
Industrial Safety
pubcrawl
security
security checks
security vulnerabilities
self learning
SeqFuzzer
stateful protocols
target protocol
vulnerability mining
deep learning perspective
composability
Compositionality
computer architecture
computer network security
Control Automation Technology devices
Data models
Decoding
deep learning
deep learning model
collaboration
EtherCAT
Fuzz Testing
fuzzing
fuzzing framework
industrial communication processes
industrial communication protocols
industrial network
industrial protocol fuzzing framework
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
microservices
software architects
service-oriented architecture
Servers
security restrictions
security of data
security
resulting microlevel policies
real-time behavior
pubcrawl
Protocols
protocol verification
policy-based governance
Policy Based Governance
Perturbation methods
CoCoME case study
microservice architectural style
message passing
macro-level security policy
macro-level policy
information-flow security policies
Information systems
information leaks
Information Flow
individual microservices
Formal Specification
cyber-physical systems
cyber-physical microservice architectures
computer architecture
collaboration
biblio
Quantum Services Architecture in Softwarized Infrastructures
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
quantum technologies
mature development
network integration
open Interfaces.
QKD systems
quantum principles
quantum random number generators
quantum resources
Quantum services architecture
Quantum Switch
quantum switches
Madrid Quantum Network
quantum-safe methods
SDN quantum node architecture
secure bit streams
service automation
single network element
software-defined networking architectures
softwarized infrastructures
specific network cards
Telecommunication standards
quantum computing security
quantum cryptography
security
Protocols
computer architecture
software defined networking
Resiliency
pubcrawl
composability
standards
software-defined networking
quantum computing
Scalability
quality of service
random number generation
security infrastructure
Switches
Predictive Metrics
Quantum Key Distribution
current networking technology
forward key material
key exchange primitive
logically centralized SDN controller
biblio
Critical Quality Factors for Rapid, Scalable, Agile Development
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
security
Q-factor
quality requirements
resilience
Resiliency
Safe Coding
safe system
Safety
scalalble agile
Schedules
secure system
pubcrawl
shared tacit knowledge
Software
software architectures
software development management
software processes
software quality
team working
Unified modeling language
unsecurable agile code
user-developer misunderstandings
executable architecture research project
Agile development
agile methods
agile projects
capability releases
collaboration
common critical quality factors
computer architecture
critical quality factors
daily standup meetings
DP management
2-week sprints
Games
high-quality development
Human behavior
Human Factors
knowledge management
Metrics
parallel agile
policy-based governance
project management
biblio
PSA: An Architecture for Proactively Securing Protocol-Oblivious SDN Networks
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
pubcrawl
unified security defense framework
telecommunication control
software-defined network (SDN)
software-defined network
software defined networking
security defense function
security defense application
security
SDN security
SDN infrastructure
Scalability
Resiliency
resilience
Bandwidth
Protocols
protocol-oblivious forwarding (POF)
proactively securing protocol-oblivious SDN networks
proactive security layer
proactive security framework PSA
proactive security
Optical fibers
data-to-control plane saturation attack
control systems
computer network security
computer architecture
business logic
Business
biblio
SDN Enabled Secure IoT Architecture
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
authentication
computer architecture
control systems
Internet of Things
Logic gates
Protocols
pubcrawl
Science of Security
biblio
An efficient modular security plane AM-SecP for hybrid distributed SDN
Submitted by grigby1 on Wed, 03/18/2020 - 11:58am
SDN layers which ease packets inspections
Internet service providers
invasive software
malwares
mobile operators
pubcrawl
resilience
Resiliency
Scalability
SDN
internet
SDN security
SDN's security issues
SDNs
security
security of data
Servers
software defined networking
technical challenges
telecommunication traffic
detecting intrusions
centralized network architecture
centralized security layer
computer architecture
Computer crime
computer network security
Conferences
control planes
data plane
denying services
AM-SecP
distributed systems
DoS/DDoS
efficient modular security plane AM-SecP
end user layer
Firewalls (computing)
flexibility
Forensics
hybrid distributed SDN
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
…
next ›
last »