Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data flows
biblio
Restricting Data Flows to Secure Against Remote Attack
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
network security
unidirectional security
Software Defined Node
software defined networking
security of data
security
SDN techniques
SDN
Resiliency
resilience
remote attacks
pubcrawl
one-way networks
one-way flows
Air gaps
Metrics
IT industry
Interiority
IEEE compliant PMU data streams
Human Factors
Human behavior
highly secure systems
fully securing networks
data flows
Data Diode
critical infrastructure
composability
air-gapped networks
biblio
Safe and Secure Data Fusion — Use of MILS Multicore Architecture to Reduce Cyber Threats
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
multicore-based real-time operating system
data fusion-based systems
flexible software architectures
functional assurance capabilities
High Robustness
high-robustness separation kernel certification
INTEGRITY-178 tuMP
MILS multicore architecture
multicore
multicore processor
cyber-attack space
multiple independent levels
restricted hardware access
RTOS
Separation Kernel
single-core processors
system providers
system security architecture
Resilient Security Architectures
operating systems (computers)
Resiliency
pubcrawl
Software Architecture
sensor fusion
data flows
aerospace computing
safety-critical software
scheduling
telecommunication security
security risks
multiprocessing systems
MILS
air traffic safety
architecture configurations
civil aircraft systems safety
covert channel prevention
cyber threats reduction
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
biblio
LUCON: Data Flow Control for Message-Based IoT Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
message-based IoT systems
usage control mechanisms
usage control
Temperature measurement
taint analysis
sensors
Semantics
Runtime
real-world IoT middleware
pubcrawl
process control
private data
policy enforcement
personal information
middleware
Metrics
Access Control
message routes
LUCON policies
IoT applications
Internet of Things
information leaks
Information Flow Control
Industrial Internet of Things
distributed systems
data-centric security policy framework
data privacy
data flows
data flow control
computer network security
composability
authorisation
biblio
Security event analysis in XBee-based wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:05pm
network nodes
XBee circuits
wireless sensor networks
wireless mesh networks
wireless mesh network
Wireless communication
telecommunication security
software/hardware assets
security of data
security event collection
security event analysis
security event
Security analysis
security
resilience
pubcrawl
Analytical models
Modeling Attacks
mobile network
microcontrollers
Metrics
Mesh networks
intruder models
data flows
data correlation
cyber-physical systems
cyber-physical security events
Crisis Management
composability
Communication system security
communication protocols
biblio
Deep packet inspection Management application in SDN
Submitted by grigby1 on Wed, 09/12/2018 - 10:24am
resilience
JSON-Java Script Object Notation
nonrelational data base
north-bound application
Open vSwitch-Open Virtual Switch
pubcrawl
QoS-Quality of Service
quality of service
real-time systems
JSON format
Resiliency
Scalability
SDN architecture
SDN-Software Defined Networking
SNMP trap notifications
software defined networking
Switches
application signature data analysis
Inspection
flow provisioning behavior
Engines
DPI-Deep Packet Inspection
DPI management application
digital signatures
deep packet inspection management
deep packet inspection
Databases
data representation
data flows
data analytic engine
data analysis
computer network security
application threshold