Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
biblio
Trustworthy design architecture: Cyber-physical system
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
security patch updates
integrated circuits
physical characteristics
physical component
physically verifiable whitelists
pubcrawl
Resiliency
Resilient Security Architectures
Security Operations Center
Industries
Software
system dependencies
TDA
Trustworthy design architecture
Trustworthy Systems
unclonable digital identity
unique system engineering technique
whitelisted system
cyber identities
authentication
computer architecture
Computer crime
conceptual system engineering framework
conventional cyber defenses
costly functional impact tests
CPS
critical infrastructures
Cyber Dependencies
cyber risks
cyber-physical systems
cyber-physical traits
defense
digital characteristics
digital commands
digitally unclonable function
biblio
SDN VANETs in 5G: An architecture for resilient security services
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
Resilient Security Architectures
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
three-way integration
software defined networking
Software
Security plane
security
SDN VANET
SDN
RSC
resilient VANET security design approach
5G
Resiliency
real-time user-defined security
pubcrawl
Fog computing
fifth generation technology
eNBC
edge computing
delays
computer architecture
Ad Hoc Network Security
5G technology
5G mobile communication
biblio
Leveraging Data Provenance to Enhance Cyber Resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
pubcrawl
Linux
Kernel
Instruments
Electronic mail
Databases
data provenance
data integrity
cyber resilience
computer architecture
background information
security of data
secure systems
Resilient Security Architectures
biblio
Cyber-resilient industrial control system with diversified architecture and bus monitoring
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
ICs
actuators
bus monitoring
computer architecture
control engineering computing
controller architecture
cyber vulnerabilities
cyber-resilient industrial control system
Cybersecurity
cybersecurity test bed
DeterLab
Hardware
security of data
industrial control
integrated circuits
Monitoring
production engineering computing
pubcrawl
Resiliency
resiliency approach
Resilient Security Architectures
Robustness
safety-critical ICS
SCADA
biblio
A resilient distributed controller for software defined networking
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
software defined networking
Software
Resilient Security Architectures
resilient distributed controller
Resiliency
resilience
pubcrawl
Proposals
placement optimization
optimization
optimisation
network topology
control systems
control plane distribution
computer architecture
biblio
Secure RAID schemes for distributed storage
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
Logic gates
B codes
Complexity theory
computational complexity
computer architecture
Decoding
decoding complexities
Distributed databases
distributed storage
eavesdropping nodes
encoding
EVENODD codes
Generators
information theory
information-theoretic security
XOR-based systematic secure RAID schemes
low-complexity schemes
node failures
optimal encoding complexities
practical high rate regime
pubcrawl
RAID
RAID architecture
random access
Reed-Solomon codes
Reliability
Resiliency
Resilient Security Architectures
Systematics
biblio
Keyword-driven security test automation of Customer Edge Switching (CES) architecture
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
pubcrawl
automated test framework
automation
CES protocol designers
computer architecture
computer network security
customer edge switching architecture
internet
Internet architecture
keyword driven security test automation
keyword-driven testing
multidomain communications
protocol validation
Protocols
testing
Resiliency
Resilient Security Architectures
robot framework
robots
security
security threats
signalling protocols
Software
STRIDE analysis
telecommunication equipment testing
telecommunication traffic
test automation
biblio
Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
IoT socio-technical systems
Communities of Interest
computer architecture
Cyber defence
cyber security
digital economy
digital-enabled enterprises
functionality requirement
IA Architecture
Information Assurance
information management
internet
Internet infrastructure developments
Internet of Things
information sharing
Protocols
pubcrawl
resilience
Resiliency
Resilient Security Architectures
risk exposure
security
security of data
sociotechnical systems
STS
Trusted Computing
socio-technical systems
biblio
SDN Security Plane: An Architecture for Resilient Security Services
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
SDN security plane
pubcrawl
real-time user-defined security
remotely controlled network
Resiliency
Resilient Security Architectures
resilient security services architecture
SDN
SDN controller
SDN security design
Proposals
SDN switches
Security plane
security-related data exchange
software defined networking
telecommunication control
telecommunication switching
third party agent
third party software module
data plane
centralised control
centralized control
computer architecture
Computer crime
computer network performance evaluation
computer network security
control plane
control systems
data packet forwarding
Agent
DDoS Attack Prevention
DDoS Attacks
IP networks
network communications
network performance
network security features
OpenFlow
Ports (Computers)
« first
‹ previous
…
46
47
48
49
50
51
52
53
54
…
next ›
last »