Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Security in Lightweight Network Function Virtualisation for Federated Cloud and IoT
Submitted by grigby1 on Tue, 12/12/2017 - 1:29pm
IoT security
security
Resiliency
pubcrawl
Protocols
network function virtualisation
Metrics
Logic gates
IP networks
6LoWPAN
Internet of Things
Human Factors
Human behavior
federation
computer architecture
composability
Communication networks
Cloud Computing
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Autonomic computing meets SCADA security
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
architecture
Autonomic computing
Autonomic Security
computer architecture
computer security
critical infrastructures
Cyber Attacks
Handheld computers
machine learning
Metrics
pubcrawl
Resiliency
SCADA Security
SCADA systems
Scalability
Transportation
biblio
Evaluation of the risk and security overlay of archimate to model information system security risks
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
Compositionality
computer architecture
Information systems
Metrics
pubcrawl
Resiliency
risk management
Scientific Computing Security
security
visualization
biblio
NSF GENI cloud enabled architecture for distributed scientific computing
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
research institute
networking traffic
North Carolina
NSF GENI cloud enabled architecture
Open Resource Control Architecture
operating systems
ORCA based GENI rack
parallel processing
provisioned L2 network domain
pubcrawl
Renaissance Computing Institute
RENCI
networking systems
Resiliency
Scientific Computing Security
scientific information systems
SDN controllers
Servers
software defined networking
software defined networking controllers
United States
virtual laboratory
virtual machines
Global Environment-for-Network Innovations
Cloud Computing
cloud federation
cloud resources
Compositionality
computer architecture
data transfer
distributed resource orchestration system
distributed scientific computing
distributed systems
Fabrics
GENI resources
baremetals
graphical user interfaces
Hardware
high-performance computing
high-throughput computing
HPC
HTC
Internet2 L2 service
L2 network domain
Metrics
National Science Foundation funded program
biblio
Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
honeypot
wide area networks
threat intelligence
security
Resiliency
pubcrawl
Protocols
network security
Metrics
large scale DDoS attacks
IP networks
IoT enabled devices
invasive software
Internet of Things
honeypot technology
attack efficiency
distributed highly-scalable WAN honeypot network attack sensing
Dictionaries
Databases
Data visualization
cyber security
computer network security
computer architecture
Compositionality
brute-force login attacks
botnets
botnet
Big Data
Attack Visualization
biblio
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
IoT updates
update infrastructure
Software updates
Software
Smart homes
Roads
Resiliency
pubcrawl
prototype implementation
Peer-to-peer computing
Metrics
Logic gates
accountability
IoT
Internet of Things
internet
Innocuousness
computer network security
computer architecture
Compositionality
botnets
blockchain
Availability
biblio
PowerCyber: A remotely accessible testbed for Cyber Physical security of the Smart Grid
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
power grid vulnerability analysis
vulnerability assessment
user interfaces
Software
smart power grids
Smart Grid
security
Resiliency
remote accessible testbed
pubcrawl
product testing
PowerCyber CPS security testbed
power systems
power system security
attack-defense platform
power engineering computing
Phasor measurement units
Metrics
Load modeling
ISU
Iowa State University
impact analysis
experimental orchestration framework
cyber-physical systems
Cyber Physical System
computer architecture
composability
biblio
A compact and efficient architecture for elliptic curve cryptographic processor
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
heterogeneous function units
word length 576 bit
UMC
size 90 nm
scalar multiplication
Resiliency
Registers
public key cryptography
pubcrawl
parallel processing
Montgomery modular division algorithm
microprocessor chips
Metrics
Kaliski's Montgomery modular inversion
arbitrary curves
hardware complexity
Hardware
Galois fields
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
elliptic curve cryptographic processor
dual-field elliptic curve cryptographic processor
computer architecture
composability
CMOS integrated circuits
CMOS 1 P9M technology
clustering technology
Clustering algorithms
biblio
Security of software defined networks: Taxonomic modeling, key components and open research area
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
Resiliency
network management
network operators
network specification
networking like routing
open research area
Policy
policy-based governance
program debugging
pubcrawl
low-level device configuration
SDN architectural layers-interfaces
SDN architecture
security solutions
simulation framework
software defined network security
software defined networking
state distribution
taxonomic modeling
thematic taxonomy
cyber-attacks
Artificial Neural Networks
Cloud Watcher
collaboration
Companies
computer architecture
Computer crime
computer network management
computer network security
control systems
artificial neural network
debugging
digital simulation
digital threats
FORTNOX
FRESCO
Governance
Government
Hardware
L-IDs
« first
‹ previous
…
49
50
51
52
53
54
55
56
57
…
next ›
last »