Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
biblio
Evaluation of Hybrid Deep Learning Techniques for Ensuring Security in Networked Control Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:41pm
learning (artificial intelligence)
Training
Support vector machines
security related problems
security of data
Resiliency
resilience
pubcrawl
privacy
NSL-KDD
networked control systems
network security
machine learning
network intrusion detection
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
internet
hybrid deep learning techniques
feature extraction
deep learning
composability
automation plant
automation networks
automation
biblio
Reliable Multipath Communication Approach for Internet-Based Cyber-Physical Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:36pm
reliability gain maximization
multipath channels
Multipath communication
multipath transport protocols
Protocols
pubcrawl
RC4CPS dynamic MP selection
Redundancy
Reliability
Monitoring
reliability requirements
reliable multipath communication approach
resilience
Resiliency
Scalability
smart grid applications
transport protocols
Availability
Metrics
Internet-based cyber-physical systems
Internet-based CPS
internet
Human Factors
Human behavior
future communication network
estimation
e2e approach
diversity
cyber-physical systems
Cyber Dependencies
Correlation
computer network reliability
Compositionality
biblio
A Universally Composable Treatment of Network Time
Submitted by grigby1 on Tue, 02/27/2018 - 1:34pm
pubcrawl
wide-spread security loss
universally composable treatment
universally composable security framework
universal composability
UC framework
time-reliant applications
Time measurement
Servers
security-sensitive systems
real-world protocols
real-world distributed system
real-time systems
public key infrastructure
Public key
authorisation
Protocols
password expiration
network time protocols
network time
modular treatment
internet
cryptographic tools
Cryptographic Protocols
cryptographic primitives
Consensus
composability
Clocks
certificate detection revocation
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 12:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience
biblio
Guaranteeing QoS requirements in long-haul RINA networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:49pm
Resiliency
policy governance
Policy-Governed Secure Collaboration
programmable networking model
Protocols
pubcrawl
QoS
QoS requirements
quality of service
Recursive InterNetwork Architecture
recursive networking model
resilience
path selection
RINA
RINA architecture
shortest-path solutions
static layered structure
TCP-IP protocol stack limitations
TCP-IP-based Internet
TCPIP
telecommunication network topology
traffic flows
transport protocols
human factor
clean slate
collaboration
computer architecture
connection-oriented solutions
data transport networks
Degradation
fastest-path solutions
flow QoS parameters
heterogeneous Quality of Service requirements
Human behavior
built-in QoS support
Human Factors
internet
long-haul
long-haul RINA networks
maximum allowed latency
Measurement
Metrics
network providers
network requirements
packet losses
biblio
Named data networking testbed for scientific data
Submitted by grigby1 on Wed, 02/21/2018 - 12:48pm
Policy-Governed Secure Collaboration
metadata
Meteorology
Metrics
name based symmetrical forwarding
named data networking
NDN-based climate data delivery
Pipelines
policy governance
large-scale scientific data
pubcrawl
resilience
Resiliency
scientific data named data
scientific information systems
Throughput
tools
human factor
climate science
climatology
collaboration
Containers
data handling
data intensive science
data-intensive science experiments
Human behavior
clean slate
Human Factors
information centric networking
information retrieval
intelligent data retrieval
intercontinental NDN testbed
intercontinental network
internet
biblio
I(FIB)F: Iterated bloom filters for routing in named data networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:48pm
information-centric networking
standards
Routing
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
named data networks
named data networking
Metrics
Memory management
iterative hashes
iterated bloom filters
Internet of Things
internet
clean slate
Information filters
Human Factors
human factor
Human behavior
hierarchical names
Future Internet
forwarding strategy
forwarding information base
energy supply
data structures
Cryptography
content distribution efficiency
Constrained Devices
collaboration
clean-slate redesign
biblio
Advanced interest flooding attacks in named-data networking
Submitted by grigby1 on Wed, 02/21/2018 - 12:48pm
resilience
Monitoring
multicast communication
multicast communications
Named-Data Networking
network infrastructure
policy governance
Policy-Governed Secure Collaboration
pubcrawl
Metrics
Resiliency
Robustness
Routing protocols
security of data
specific DDoS attack
telecommunication security
unsatisfiable content requests
data-plane
advanced interest flooding attacks
clean slate
clean-slate Internet proposal
collaboration
complete attack model
computer architecture
Computer crime
computer network security
advanced IFA
Electronic mail
Human behavior
human factor
Human Factors
information-centric networking
Interest Flooding Attack
internet
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
« first
‹ previous
…
68
69
70
71
72
73
74
75
76
…
next ›
last »