Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
The Design of Campus Security Early Warning System based on IPv6 Wireless Sensing
Submitted by grigby1 on Fri, 02/24/2023 - 4:31pm
sensors
wireless sensing
CSI
Alarm systems
Personnel
video surveillance
IPv6
Policy Based Governance
real-time systems
collaboration
composability
Wireless communication
wireless sensor networks
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications
Submitted by grigby1 on Fri, 02/24/2023 - 4:30pm
Protocols
IPv6 Conformance Test
conformance testing
Automatic testing
Mission critical systems
IPv6
Policy Based Governance
military communication
composability
collaboration
performance evaluation
network security
IoT devices
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Design and Practice of Campus Network Based on IPv6 Convergence Access in Guangdong Ocean University
Submitted by grigby1 on Fri, 02/24/2023 - 4:30pm
composability
smart campus construction
NB-IOT
Wi-Fi
education
IPv6
Policy Based Governance
maintenance engineering
network security
Oceans
Internet of Things
Production
optimization
Resiliency
resilience
Metrics
pubcrawl
security
collaboration
biblio
The transitional phase of Boost.Asio and POCO C++ networking libraries towards IPv6 and IoT networking security
Submitted by grigby1 on Fri, 02/24/2023 - 4:30pm
C++ languages
POCO
Internet Protocol version 6 (IPv6)
Internet Protocol Security (IPsec)
C++ networking libraries
Boost.Asio
codes
Internet of Things (IoT)
IPv6
operating systems
Policy Based Governance
collaboration
programming
Libraries
composability
Protocols
Hardware
Resiliency
resilience
Metrics
pubcrawl
security
biblio
P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4
Submitted by grigby1 on Fri, 02/24/2023 - 4:30pm
composability
ICMPv6
Flooding
P4
spoofing
denial-of-service attack
IPv6
DDoS
Policy Based Governance
Switches
collaboration
Prototypes
Protocols
internet
Safety
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Model-Agnostic Scoring Methods for Artificial Intelligence Assurance
Submitted by grigby1 on Fri, 02/17/2023 - 4:41pm
deep learning
Scoring Methods
equilibrium
AI Assurance
software assurance
Pipelines
Telecommunications
optimization
Software algorithms
Training
Scalability
Safety
Software
Resiliency
resilience
pubcrawl
security
biblio
Information Assurance in modern ATE
Submitted by grigby1 on Fri, 02/17/2023 - 4:41pm
Information Assurance
ATE
computer
Costs
cyber security
operating systems
pubcrawl
resilience
Resiliency
Scalability
security
Software
software assurance
Software measurement
Time measurement
Trademarks
biblio
Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices
Submitted by grigby1 on Fri, 02/17/2023 - 4:40pm
Safety
vulnerabilities
Virtual private networks
threats
supply chains
Standards organizations
software reliability
software assurance
Software
security
Scalability
Information Assurance
Resiliency
resilience
pubcrawl
privacy
Operating-Systems
legislation
integrity
Information-Assurance
Hack
attack
biblio
Security Testing as part of Software Quality Assurance: Principles and Challenges
Submitted by grigby1 on Fri, 02/17/2023 - 4:40pm
software assurance
software design
Software Testing
requirements engineering
software quality
Object recognition
Scalability
Conferences
Resiliency
resilience
pubcrawl
security
biblio
A Percolation-Based Secure Routing Protocol for Wireless Sensor Networks
Submitted by grigby1 on Fri, 02/17/2023 - 4:28pm
security
pubcrawl
Human behavior
Scalability
wireless sensor networks
telecommunication traffic
Routing
simulation
clustering
Stability analysis
Routing protocols
Secure
wireless sensor networks (WSN)
percolation
Social Agents
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »