Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
5g network
biblio
The Block Chain Technology to protect Data Access using Intelligent Contracts Mechanism Security Framework for 5G Networks
Submitted by grigby1 on Fri, 09/08/2023 - 9:07am
composability
Mechanism Security
Management
Application and Services
5g network
blockchains
intelligent data
Compositionality
Data Security
network security
information security
5G mobile communication
data privacy
privacy
Scalability
Resiliency
resilience
pubcrawl
blockchain
security
biblio
An Enhanced Security Architecture for Industry 4.0 Applications based on Software-Defined Networking
Submitted by grigby1 on Fri, 02/17/2023 - 4:25pm
wireless networks
SDN controller
5g network
fourth industrial revolution
OpenFlow
distributed ledger
Industry 4.0
SDN security
Time factors
security
SDN
information and communication technology
5G mobile communication
Scalability
Resiliency
resilience
pubcrawl
biblio
Formal Verification of 5G EAP-AKA Protocol
Submitted by grigby1 on Thu, 02/24/2022 - 11:31am
composability
pubcrawl
ProVerif
protocol verification
Protocols
privacy
policy-based collaboration
model checking
formal verification
Compositionality
5G EAP-AKA
Communications technology
collaboration
codes
authentication protocol
authentication
applied Pi-Calculus
Analytical models
5g network
5G mobile communication
biblio
The Anomaly Detection Mechanism Using Extreme Learning Machine for Service Function Chaining
Submitted by grigby1 on Tue, 03/30/2021 - 10:54am
ICS Anomaly Detection
service integrity
service function chaining
Scalability
Resiliency
resilience
pubcrawl
Neurons
network function virtualization
5G mobile communication
Extreme learning machines
extreme learning machine
Containers
cloud-native
Cloud Computing
Anomaly Detection
5g network
biblio
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 11:42am
hyper-connected society
automotive security-risk analysis
automotive vehicles
car-hacking studies
car-hacking techniques
common-vulnerabilities- exposure system
cyber kill chain-based cyberattack analysis method
electronic control devices
formal vulnerability-analysis system
automotive industry
ICT environment
information security techniques
mechanical devices
security risk analysis
systematic security-risk-assessment
vehicle-related cyberattacks
vulnerability-information-sharing architecture
Chained Attacks
Computer crime
resilience
Resiliency
automobiles
Automotive engineering
Autonomous Driving
Scalability
5G mobile communication
Industries
pubcrawl
risk analysis
information sharing
traffic engineering computing
Cyber Kill Chain
automotive cybersecurity
Ransomware
5g network
automotive CVE
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
covert channels
modulation method
modulation
jam system
interference algorithm
fifth generation mobile network
diversity reception
diversity networks
distributing jammer
distributed jamming system
co-constructing and sharing
5g network
5G mobile network
radiofrequency interference
Jamming
security
Interference
covert channel
covert timing channel
Transmitters
timing
Compositionality
network security
5G mobile communication
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
Servers
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
Resilient Security Architectures
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Internet of Things
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
communication entities
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
3GPP
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
biblio
Multicast Design for the MobilityFirst Future Internet Architecture
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
MobilityFirst future Internet architecture
clean slate future Internet architecture
efficient multicast mechanism
fifth generation network
hierarchical multicast packet header
interdomain mobile scenario
low-cost dynamic multicast routing
mobile consumers
mobility support
MobilityFirst architecture
clean separation
multicast design
multicast group members
multicast prototype system
multicast service
multicast source
network location
wireless access
clean slate
policy governance
5G mobile communication
mobile computing
computer architecture
Resiliency
Human behavior
pubcrawl
Routing
Metrics
internet
telecommunication network routing
Protocols
Logic gates
identity
mobile networks
mobile devices
mobility management (mobile radio)
network resources
mobile nodes
multicast communication
5g network
biblio
Blockchain-Enabled 5G Autonomous Vehicular Networks
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
5g network
autonomous vehicular
blockchain
decentralized system
Human behavior
Human Factors
Metrics
pubcrawl
Scalability
Tamper resistance
biblio
MAEC-X: DDoS Prevention Leveraging Multi-Access Edge Computing
Submitted by grigby1 on Wed, 12/18/2019 - 1:44pm
Human behavior
Resiliency
resilience
pubcrawl
Protocols
network security
multitier networking
multiaccess edge computing
Monitoring
Metrics
MAEC-X
Internet-of-Everything era
internet
5G mobile communication
edge computing
denial-of-services attacks
DDoS prevention solution
DDoS prevention
DDoS Attacks
DDoS Attack Prevention
computer network security
Computer crime
computer architecture
composability
5g network
1
2
next ›
last »