Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security functions
biblio
Placement optimization of IoT security solutions for edge computing based on graph theory
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
Internet of Things
Security Metrics
security functions
security as a service
pubcrawl
placement optimization
Metrics
IoT security solutions
IoT security framework
IoT network
IoT
Centrality
graph theory
EndToEnd like encryption
edge computing security
edge computing
dominating set
Cryptography
Computing Theory
computer network security
centrality metrics
biblio
Dynamic Mulitiple Agent Based IoT Security Management System
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT security
strong security
security related resources
security functions
security
Resiliency
pubcrawl
multiple security protocol compatibility
multi-agent
Metrics
IoT system
IoT security management system
applications security requirements
IoT devices
IoT
Internet of Things
efficient energy management
dynamic security agent management framework
dynamic mulitiple agent
Dymatic mangagement
cyber-physical systems
computer network security
composability
biblio
A Construction Method of Security Mechanism Requirement for Wireless Access System Based on CC Standard
Submitted by grigby1 on Tue, 01/21/2020 - 11:33am
Safety
Wireless communication
wireless access system
telecommunication security
standards
security threats
security mechanism requirement construction method
security functions
security functional components
security evaluation standard
security assurance components
Security Assurance
Security Assessment Standards
security
Scalability
collaboration
Resiliency
resilience
radio access networks
pubcrawl
policy-based governance
Metrics
information technology
Information Assurance
incomplete security mechanism
Human behavior
emergency communication network
composability
Communication system security
Communication networks
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chain verification
security chains
security functions
model checking
smart devices
SMT
software defined networking
software-defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chains
security chain verification
security functions
model checking
smart devices
SMT
software-defined networking
software defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes