Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network links
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
passive attacks
wiretap attacks
wiretap attack
wireless networks
wired networks
weak security
secure network coding system architecture
Routing
Resiliency
resilience
Receivers
random network coding system
random codes
pubcrawl
communication confidentiality
network performance metrics
network links
network coding
Metrics
Hash functions
encoding
eavesdropper
deterministic network coding system
cyber security
cyber physical systems
Cryptography
composability
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Software-defined networking (SDN)
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
ongoing attacks
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
Internet connectivity
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Anomaly Detection
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
biblio
Individually-Secure Multi-Source Multicast
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
network links
zero mutual information
telecommunication security
SMSM
security
secure MSM
Resiliency
resilience
Reliability
rate region
pubcrawl
nonsecure MSM
network topology
coding theory
network coding
Mutual information
multicast communication
Metrics
individually-secure multisource multicast
encoding
eavesdropper
cut-set bound
Cryptography
Compositionality
common secure model