Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authenticated malicious IoT devices
profile
Israel Arroyo
Aerospace
Architectures
Dams Sector
Defense Industrial Base Sector
Emergency Services Sector
Energy Sector
Government Facilities Sector
Healthcare and Public Health Sector
Hybrid Models
Information Technology Sector
Medical Devices
Networked Control
Nuclear Reactors, Materials, and Waste Sector
Probabilistic and Statistical Verification
SCADA Systems
Secure Control Systems
Water and Wastewater Systems Sector
Design Automation Tools
Ground Vehicles
Quantitative Verification
Smart Grid
Communication
Concurrency and Timing
Embedded Software
Model Integration
Real-time Systems
Space Systems
Testing
Control
Defense
Platforms
Time Synchronization
Modeling
Systems Engineering
Real-Time Coordination
Wireless Sensing and Actuation
Health Care
Resilient Systems
Science of System Integration
Robotics
Science of Security
Simulation
Validation and Verification
CPS Technologies
Education
Science Policy
Research Program Overview
security
conference
advanced artificial intelligence deep learning technology
adaptive machine learning based approach
Attacks on IoT Devices
authenticated malicious IoT devices
5G-IoT ubiquitous network
Ohio
biblio
SDN Enabled Secure IoT Architecture
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
resource-constrained devices
Software Defined Network (SDN) Security
Precision agriculture
Policy based Secure IoT Architecture
lightweight protocol
IoT network infrastructure security
IoT Authentication and Access Control
Internet of Things (IoT) Security
integrated security approach
authenticated malicious IoT devices
Network Security Architecture
cyber systems
critical national infrastructure
computer network security
Software Defined Networks
Logic gates
control systems
SDN
authentication
pubcrawl
Resiliency
software defined networking
computer architecture
Protocols
Cryptographic Protocols
Internet of Things