Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
business communication
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 11:42am
SDN infrastructure
Network Security Architecture
networking arena
Performance analysis
policy-based approach
Policy-based Security Architecture
pubcrawl
resilience
SDN based enterprise networks
network devices
SDN security
secure SDN
security attacks
security measures
security policies
software defined networking
telecommunication security
Dynamical Systems
network attacks
Metrics
Enterprise Network Security
dynamic policy framework
dynamic policy enhanced integrated security architecture
dynamic networks
dynamic changes
different security mechanisms
computer network security
computer network management
business communication
authorisation
composability
Predictive Metrics
Resiliency
biblio
Malicious URL Linkage Analysis and Common Pattern Discovery
Submitted by grigby1 on Fri, 12/11/2020 - 1:35pm
Malicious URL
website
Web pages
URL
Uniform resource locators
Resiliency
resilience
real enterprise network
pubcrawl
privacy
open-source threat intelligence
Metrics
Malware Analysis
malware
malicious URL linkage analysis
blacklisting
malicious domain names
malicious domain name
malicious destinations
linkage analysis
internet
Industries
Human behavior
graph-based model
graph theory
drive-by download
Crawlers
Couplings
computer network security
business communication
biblio
A Competency Model to Help Selecting the Information Security Method for Platforms of Communication by Visible Light (VLC)
Submitted by grigby1 on Mon, 11/19/2018 - 11:34am
Metrics
VLC
Visible Light Communications Security
visible light communication
TOPSIS and The Game Theory
security of data
security information
security criteria
security
Scalability
right security problems
Resiliency
resilience
research project
pubcrawl
alternative methods
light emitting diodes
information security method
information security
Informatics
free-space optical communication
Decision Making
Data models
competency model
Communication by Visible Light (VLC)
business context
business communication
Bayesian Nets
Analytical models
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks