Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet-connected devices
biblio
A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
IPv6 source address
telecommunication network management
Switches
source address authentication
software defined networking
Software Defined Network
Servers
SDN
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network addresses
Metrics
message authentication
access network
ipv6 security
IPv6 protocol
IP networks
Internet-connected devices
internet
hierarchical authentication mechanism
fine-grained security protection
encryption authentication
Cryptography
computer network security
computer architecture
composability
collaboration
authentication
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
Licenses
ZMap
unintended IPv6 connectivity
sensitive data exposure
Security by Default
security
Scalability
RNA
Revere DNS (rDNS)
Resiliency
resilience
pubcrawl
privacy
principal component analysis
network scanning
Network reconnaissance
computer network security
large-scale security scans
IPv6 hosts
IPv6 address space
IPv6
IPv4 hosts
IP networks
internet-wide scans
Internet-connected devices
Internet of Things devices
Internet of Things
internet
integrated circuits
DNSSEC-signed IPv6 reverse zones
DNSsec
DNS
biblio
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
resilience
wireless sensor networks
wireless protocols
Wireless communication
wearables security
Wearable devices
vulnerability assessment method
smartphone
smart phones
security of data
security
Scalability
Resiliency
Biomedical monitoring
pubcrawl
Protocols
privacy
Internet-connected devices
Internet of Things (IoT)
Internet of Things
Human behavior
Cybersecurity
body area networks
bluetooth low energy
Bluetooth