Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multicast communications
biblio
Systematically Encoded Polynomial Codes to Detect and Mitigate High-Status-Number Attacks in Inter-Substation GOOSE Communications
Submitted by grigby1 on Mon, 10/04/2021 - 3:04pm
Metrics
Substations
substation automation
Resiliency
pubcrawl
power system security
Payloads
parity check codes
object oriented security
network security
multicast communications
Communication system security
message authentication
linear codes
information security
Industrial Communication
Generators
encoding
cyber-physical systems
Cryptography
composability
biblio
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
communication
composability
universally composable key bootstrapping
universal composability model
universal composability
strong security notion
session keys
secure key bootstrapping protocol
secure communication protocol
practical key bootstrapping protocol
multiple energy resources
multicast communications
key bootstrapping
ideal functionality
energy internet
security
multicast communication
energy resources
Smart Grids
power engineering computing
Energy Efficiency
smart power grids
internet
Computational modeling
Cryptography
pubcrawl
Protocols
Cryptographic Protocols
telecommunication security
biblio
Advanced interest flooding attacks in named-data networking
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
resilience
Monitoring
multicast communication
multicast communications
Named-Data Networking
network infrastructure
policy governance
Policy-Governed Secure Collaboration
pubcrawl
Metrics
Resiliency
Robustness
Routing protocols
security of data
specific DDoS attack
telecommunication security
unsatisfiable content requests
data-plane
advanced interest flooding attacks
clean slate
clean-slate Internet proposal
collaboration
complete attack model
computer architecture
Computer crime
computer network security
advanced IFA
Electronic mail
Human behavior
human factor
Human Factors
information-centric networking
Interest Flooding Attack
internet