Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed security
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
biblio
Software-Defined Networking for Improving Security in Smart Grid Systems
Submitted by aekwall on Mon, 03/18/2019 - 9:55am
Resiliency
wide-area security management
traditional smart grid systems
traditional smart grid architecture
software-defined networking
software defined networking
smart power grids
Smart Grids
smart grid security
Smart Grid
smart decision making
security of data
SDN-based smart grid systems
SDN based solutions
SDN
Scalability
attacks
pubcrawl
Protocols
power system security
power engineering computing
Metrics
mentioned security threats
main cyber-security objectives
IP networks
distributed security
Decision Making
cyber security
control systems
computer architecture
Big Data