Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security
biblio
Threats and Vulnerabilities Handling via Dual-stack Sandboxing Based on Security Mechanisms Model
Submitted by grigby1 on Fri, 02/17/2023 - 5:09pm
security model
network sandbox
dual-stack
policy governance
sandboxing
navigation
cyber security
Knowledge engineering
IPv6
Training
network security
composability
Computational modeling
Analytical models
pubcrawl
security
collaboration
biblio
Application and Parallel Sandbox Testing Architecture for Network Security Isolation based on Cloud Desktop
Submitted by grigby1 on Fri, 02/17/2023 - 5:09pm
Cloud Computing
collaboration
information security
Organizations
pubcrawl
composability
network security
network architecture
Firewalls (computing)
sandboxing
policy governance
Cloud Desktop
Isolation technology
Network Security Isolation
Parallel Sandbox
Testing Architecture
biblio
A Study on Various Intrusion Detection Models for Network Coding Enabled Mobile Small Cells
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
network security
Safe Coding
Small Cells
message authentication codes
Lead
5G networks
network coding
Urban areas
policy-based governance
security
Resiliency
Metrics
pubcrawl
Protocols
Intrusion Detection
5G mobile communication
Human Factors
biblio
Re-Encryption Model for Multi-Block Data Updates in Network Security
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
Data visualization
Safe Coding
Update Code Online Data Reconstruction
revocation
re-encryption
cloud storage
Advanced Encryption Standards
data centers
codes
Data models
policy-based governance
network security
Resiliency
Metrics
pubcrawl
encryption
Cloud Computing
Human Factors
biblio
Spatio-Temporal Attack Course-of-Action (COA) Search Learning for Scalable and Time-Varying Networks
Submitted by grigby1 on Mon, 02/13/2023 - 3:03pm
pubcrawl
Scalability
information and communication technology
convergence
network security
Monte Carlo methods
Scalable Security
Search methods
Behavioral sciences
biblio
A Comprehensive Network Security Management in Virtual Private Network Environment
Submitted by grigby1 on Mon, 02/13/2023 - 3:02pm
Organizations
pubcrawl
network security
Scalability
Computers
Forensics
Firewalls (computing)
Gain measurement
Economics
Scalable Security
Digital Forensics
Virtual Private Network (VPN)
biblio
Developing a Scalable Network of High-Interaction Threat Intelligence Sensors for IoT Security
Submitted by grigby1 on Mon, 02/13/2023 - 2:58pm
IoT security
computer networks
honeypots
iiot
Industrial Internet of Things
Intelligent sensors
IoT
network measurements
network security
pubcrawl
Scalability
Scalable Security
security
Threat Intelligence Sensor
biblio
Detection of SQL Injection Attack Using Adaptive Deep Forest
Submitted by grigby1 on Fri, 02/03/2023 - 3:49pm
Classification algorithms
SQL injection detection
random forest classifier
Decision tree classifier
Adaptive deep forest
telecommunication computing
web security
AdaBoost
SQL injection
Vegetation
Organizations
network security
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Forestry
biblio
The Establishment of Internet-Based Network Physical Layer Security Identification System
Submitted by grigby1 on Fri, 02/03/2023 - 3:37pm
pubcrawl
Metrics
resilience
Resiliency
internet
5G mobile communication
composability
network security
internet technology
Error analysis
Physical layer
physical layer security
Symbols
network physical layer
security identification system physical layer network coding
biblio
CVSS-based Vulnerability and Risk Assessment for High Performance Computing Networks
Submitted by aekwall on Thu, 02/02/2023 - 5:45pm
real-time systems
standardization
pubcrawl
Scalability
Resiliency
Knowledge engineering
Throughput
network security
Stochastic processes
CVSS
attack graph
Numerical models
HPC
Vulnerability
risk assessment
Stochastic Computing Security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »