Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security
biblio
Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT
Submitted by aekwall on Fri, 03/03/2023 - 10:51am
certification
key management
Industrial IoT
Improved PKI
centralized device management
Costs
Industrial Internet of Things
Production facilities
blockchains
Servers
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Public key
network security
biblio
Network attack detection model based on Linux memory forensics
Submitted by grigby1 on Fri, 03/03/2023 - 9:25am
pubcrawl
Metrics
Resiliency
Analytical models
internet
composability
Memory management
network security
Linux
Compositionality
resilience
Forensics
Memory Forensics
Linux Operating System Security
mechatronics
Linux kernel analysis
biblio
A Study on the Testing of Android Security Patches
Submitted by grigby1 on Fri, 03/03/2023 - 9:24am
security
pubcrawl
Metrics
Resiliency
composability
network security
Linux
Kernel
Java
Compositionality
resilience
user interfaces
Linux Operating System Security
codes
biblio
Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology
Submitted by grigby1 on Fri, 03/03/2023 - 9:23am
Compositionality
Shodan Eye
Linux Operating System Security
Vulnerability Analysis
Kali Linux
Reconnaissance
Software algorithms
operating systems
resilience
Organizations
Linux
network security
composability
Industries
privacy
Resiliency
Metrics
pubcrawl
biblio
IoT Enhancement with Automated Device Identification for Network Security
Submitted by grigby1 on Tue, 02/28/2023 - 5:51pm
Fingerprint recognition
Weak
Powerless system
IP Connection
Firmware Equipment
Automated Device
Distance measurement
IoT device
law enforcement
IoT network security
Market research
Internet of Things
composability
Object recognition
IoT security
network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Node Protection using Hiding Identity for IPv6 Based Network
Submitted by grigby1 on Fri, 02/24/2023 - 5:31pm
Policy Based Governance
SHA2
OPNET
IP spoofing
logistic map
RSA
Steganography
Power demand
IPv6
traffic control
Receivers
collaboration
network security
Memory management
composability
Computational modeling
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications
Submitted by grigby1 on Fri, 02/24/2023 - 5:30pm
Protocols
IPv6 Conformance Test
conformance testing
Automatic testing
Mission critical systems
IPv6
Policy Based Governance
military communication
composability
collaboration
performance evaluation
network security
IoT devices
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Design and Practice of Campus Network Based on IPv6 Convergence Access in Guangdong Ocean University
Submitted by grigby1 on Fri, 02/24/2023 - 5:30pm
composability
smart campus construction
NB-IOT
Wi-Fi
education
IPv6
Policy Based Governance
maintenance engineering
network security
Oceans
Internet of Things
Production
optimization
Resiliency
resilience
Metrics
pubcrawl
security
collaboration
biblio
Security Service-aware Reinforcement Learning for Efficient Network Service Provisioning
Submitted by grigby1 on Fri, 02/17/2023 - 5:25pm
QoS
network security equipment
Network provisioning
Link state
security constraints
Costs
faces
Reinforcement learning
SDN security
pubcrawl
Prediction algorithms
SDN
network security
delays
Routing
Scalability
Resiliency
resilience
biblio
Hierarchical and Complex Parallel Network Security Threat Situation Quantitative Assessment Method
Submitted by grigby1 on Fri, 02/17/2023 - 5:21pm
pubcrawl
Metrics
resilience
Resiliency
network security
Computational modeling
network topology
Compositionality
Market research
Knowledge engineering
Assessment Method
Hierarchical and Complex Parallel
network systems
Situation Quantitative Assessment
Scientific Computing Security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »