Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Protocols
biblio
P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4
Submitted by grigby1 on Fri, 02/24/2023 - 5:30pm
composability
ICMPv6
Flooding
P4
spoofing
denial-of-service attack
IPv6
DDoS
Policy Based Governance
Switches
collaboration
Prototypes
Protocols
internet
Safety
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things
Submitted by grigby1 on Fri, 02/24/2023 - 4:46pm
pubcrawl
Resiliency
Scalability
authentication
internet
Protocols
telecommunication traffic
real-time systems
SDN
resilience
iobt
military computing
Human Factors
Behavioral sciences
Behavior-based Authentication
Network Traffic Management
biblio
Privacy and security challenges for autonomous agents : A study of two social humanoid service robots
Submitted by grigby1 on Fri, 02/17/2023 - 5:27pm
accountability
Social Agents
DLT
autonomous agents
Agent
social robots
humanoid robot
autonomy
Robot sensing systems
privacy
Protocols
Scalability
security
Human behavior
pubcrawl
machine learning
Cloud Computing
biblio
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal
Submitted by grigby1 on Fri, 02/17/2023 - 5:26pm
Resiliency
Violations Detection
Software Defined Networks
SDN security
Software algorithms
Artificial Intelligence
Protocols
Scalability
Heuristic algorithms
computer architecture
resilience
pubcrawl
machine learning
security
machine learning algorithms
deep learning
Schedules
biblio
The Computational and Symbolic Security Analysis Connections
Submitted by grigby1 on Fri, 02/17/2023 - 5:21pm
pubcrawl
Metrics
resilience
Resiliency
Protocols
Computational modeling
automata
Compositionality
Numerical models
scientific computing
Data integration
cloud storage
computational security
Light rail systems
Symbolic Security Analysis
Scientific Computing Security
biblio
Secret Numerical Interval Decision Protocol for Protecting Private Information and Its Application
Submitted by grigby1 on Fri, 02/17/2023 - 5:20pm
privacy protection
Scientific Computing Security
secret comparison
numerical range
Morton code
Asia
Homomorphic encryption
scientific computing
Compositionality
information security
Decision Making
Protocols
privacy
Resiliency
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
Decentralizing loT Public- Key Storage using Distributed Ledger Technology
Submitted by grigby1 on Fri, 02/17/2023 - 5:18pm
Resistance
public-key
loT
file storage
scalable verification
Distributed Ledger Technology
distributed ledger
Tamper-Resistance
Performance analysis
Public key
pubcrawl
Compositionality
smart contracts
Wireless communication
Protocols
Scalability
Resiliency
resilience
Metrics
biblio
Multi-Robot Security System based on Robot Operating System and Hybridized Blockchain Model
Submitted by grigby1 on Fri, 02/17/2023 - 5:06pm
operating systems
trajectory planning
Multi robot system
Hybridized Blockchain Model
policy governance
decentralization
blockchains
Robot kinematics
ROS
Robot Operating System
collaboration
real-time systems
Protocols
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
security
biblio
A Study on Various Intrusion Detection Models for Network Coding Enabled Mobile Small Cells
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
network security
Safe Coding
Small Cells
message authentication codes
Lead
5G networks
network coding
Urban areas
policy-based governance
security
Resiliency
Metrics
pubcrawl
Protocols
Intrusion Detection
5G mobile communication
Human Factors
biblio
Proposed Security Measures for Code Injection for CubeSats
Submitted by aekwall on Fri, 02/17/2023 - 10:49am
security
Human Factors
authentication
Protocols
pubcrawl
Metrics
Resiliency
policy-based governance
malware
Satellites
codes
passwords
CubeSat and satellite
HMAC
Safe Code Injection
Safe Coding
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »