Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network architecture
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 3:54pm
Mobility
telecommunication network routing
specific user
Servers
Scalability
Resiliency
resilience
Receivers
pubcrawl
promising information-centric networking architectures
potential receivers
network architecture
named data networking
Named Data Network Security
named data network
Access Control
internet
Industries
Human behavior
fine-grained access control mechanism
fine-grained access control
FGAC-NDN
desired file
desired content
DBDH assumption
data confidentiality
computer science
cache storage
Bilinear Pairing
authorisation
biblio
A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
architectural design
structural design
security architecture framework
security architecture
security architectural framework
secured information systems
ring-based nested network zones
Nested Zones
N-tier/shared nothing system architectures
defense-in-depth approach
defense in depth
data centers
critical infrastructure
Attack Hops
security of data
network architecture
Network Security Architecture
critical information infrastructure
Guidelines
security attributes
Information systems
Software Architecture
standards
pubcrawl
Resiliency
computer architecture
security
biblio
Re-envisioning digital architectures connecting CE hardware for security, reliability and low energy
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
personal area networks
data transfer
digital architectures
Local area networks
Low power
low-power components
multiple bridged peripheral links
network architecture
Network of Things
peripheral interfaces
data network architecture
private universal data platform
push-pull data network architecture
scalable switchable data platform
Software Constructed ad-hoc circuit network
ultra-low power data platform
universal peripheral communications links
USB 3.0
USB 3.0 data transfer cables
Ad hoc networks
Hardware
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
privacy
internet
data privacy
electronic data interchange
Network Security Architecture
CE hardware
Consumer Data
consumer electronic systems
Consumer electronics
data connectivity technologies
data exchange
biblio
A Secure Blockchain-Based Group Mobility Management Scheme in VANETs
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Security analysis
Protocols
pubcrawl
resilience
Resiliency
Safe Coding
safe transportation
secure blockchain-based group mobility management scheme
secure group mobility management scheme
security
policy-based governance
security functionalities
significant overload
smooth handovers
telecommunication security
VANET
VANETs
vehicular ad hoc networks
Vehicular Ad-hoc Network
high mobility
blockchain
collaboration
Distributed Mobility Management
distributed mobility management protocol
DMM solutions
frequent handovers
group communication scenario
Handover
handover authentication
authentication
Human behavior
Human Factors
message authentication
Metrics
mobility management (mobile radio)
network architecture
network entities
next generation mobile network
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
biblio
Mitigating Content Poisoning in Content Centric Network: A Lightweight Approach
Submitted by grigby1 on Tue, 01/21/2020 - 11:28am
data dissemination
digital signatures
Information Centric Network
Information Centric Networks
information security
network architecture
pubcrawl
publish-subscribe systems
resilience
Resiliency
Scalability
file
An Actuarial Framework of Cyber Risk Management for Power Grids
Submitted by cheewooi on Thu, 01/09/2020 - 6:10pm. Contributors:
Chee-Wooi Ten
YeonWoo Rho
Lingfeng Wang
Wei Wei
Actuarial framework
Cybersecurity
network architecture
power grid stability
Posters
1739422
1739485
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 10:47am
secure communication links
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
message transmission
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
OpenFlow
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
computer network security
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
biblio
STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Metrics
trust level
telecommunication security
STAODV
service attack
security
secure trust based approach
Routing protocols
Routing
Resiliency
resilience
pubcrawl
participating node
network layer
network architecture
mobile ad hoc networks
adjacent nodes
MANET security
MANET force
MANET
malicious node
Conferences
Computational modeling
Compositionality
blackhole attack mitigation
Blackhole attack
Base stations
autonomous nodes
attack mitigation
AODV routing protocol
AODV based MANET
AODV
« first
‹ previous
1
2
3
4
5
6
next ›
last »