Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
Performance Evaluation of the Geographic Routing Protocols Scalability
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
pubcrawl
WSN
wireless sensor networks
traffic rates
telecommunication traffic
telecommunication security
telecommunication network topology
SRGBR
SRBGR protocol
sensors
security scalability
Secure Region Based Geographic Routing
Scalability
Routing protocols
Routing
Compositionality
network topology
network density scenarios
network densities
Meters
high density network scenarios
geographic routing protocols scalability
geographic routing approach
geographic routing
end-to-end delay performance metric
end-to-end delay
Dynamic Window Secure Implicit Geographic Forwarding
DWSIGF protocol
DWSIGF
delays
biblio
Extended TLS Security and Defensive Algorithm in OpenFlow SDN
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
pubcrawl
Transport Layer Security
telecommunication channels
SSL/TLS
SSL Trust Models
software defined networking
Software Defined Network (SDN)
Software Defined Network
Servers
security
SDN security attacks
SDN OpenFlow communication
SDN controller
Scalability
Resiliency
resilience
SDN security
Protocols
OpenFlow SDN
OpenFlow
network topology
Network interfaces
network interface
Metrics
Human Factors
Human behavior
computer network security
computer network reliability
communication channel
certification
authentication
biblio
Research on the IPv6 Technical Defects and Countermeasures
Submitted by grigby1 on Tue, 01/21/2020 - 12:07pm
ipv6 security
transport protocols
TCP/IP protocol cluster
Spliced Address
security
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network topology
Metrics
IPv6 technical defects
IPv6 spliced address
Big Data
IPv6 interface ID
IPv6 address structure design ideas
IPv6
IPv4 Upgrading
IPv4
IP networks
internet
Interface ID
global Internet
composability
collaboration
cloud storage
Cloud Computing
biblio
LevelTree: A New Scalable Data Center Networks Topology
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
shortest path
LevelTree
network topology
new scalable data center network topology
pubcrawl
resilience
Resiliency
Scalability
Servers
Jellyfish
telecommunication network routing
telecommunication network topology
topological properties
Topology
tree topology
Vegetation
VolvoxDC
Data Center Network(DCN)
Bisection Bandwidth
cloud based applications
computer centres
computer networks
Control Theory
critical topologies
Cyber Physical System
cyber physical systems
Bandwidth
data centers
DCN topology
Diameter of graph
Fattree
graph theory
high bisection bandwidth
Human behavior
biblio
Differential Privacy of Online Distributed Optimization under Adversarial Nodes
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
graph theory
sensitive data
Scalability
Resiliency
resilience
regular node
pubcrawl
privacy
preliminary attempt
optimization
online learning
online distributed optimization
network topology
learning (artificial intelligence)
important data information
Human behavior
adversarial
distributed optimization
distributed online learning algorithm
Distributed databases
differential privacy
different adversary models
data privacy
data analysis
cyber-physical systems
cyber physical systems
Cyber Physical System
Control Theory and Privacy
Control Theory
big data analysis methods
Big Data
adversarial nodes
biblio
AIS Reputation Mechanism in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
security
Pathogens
pubcrawl
real-time trust computations
reputation
resilience
Resiliency
resilient reputation mechanism
Routing
PAMP
security of data
self-organizing network
selfish
telecommunication network topology
telecommunication security
trust
trust state
trust values
Immune system
network topology
neighbor nodes
mobile ad hoc networks
Metrics
MANET trust frameworks
MANET security
MANET nodes
MANET
nodes act
flexible networking capability
dynamic topology
Danger Signal
Computational modeling
Compositionality
Artificial Intelligence
AIS reputation mechanism
AIS
biblio
A Novel Route Randomization Approach for Moving Target Defense
Submitted by aekwall on Mon, 09/09/2019 - 10:48am
Monitoring
IP networks
software defined networking
moving target defense
Resiliency
pubcrawl
Routing protocols
network topology
control systems
Topology
Scalability
forwarding routes
route randomization
Software Defined Network
Time-frequency Analysis
Predictive Metrics
biblio
Access Control Policy Enforcement for Zero-Trust-Networking
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
Scalability
policy enforcement
policy enforcement framework
policy-based governance
Production
pubcrawl
resilience
Resiliency
rigorous access control
risk-based access control
risk-based access control decision making
network zone
securing computer networks
Software
transaction-based interactions
trust
virtualized infrastructures
zero trust
zero trust networking
zero-trust-networking
zone resources
ZTN networks
Firewalls (computing)
access control process
authorisation
authorization
computer network management
computer network security
computer networks
Decision Making
dynamicity
enterprise computing landscape
firewall
access control policy enforcement
fog/edge computing
generic firewall policy language
heterogeneous user contexts
Human behavior
Human Factors
industrial internet
Internet of Things
micro-segment
network topology
biblio
Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks
Submitted by aekwall on Mon, 06/24/2019 - 3:00pm
Resiliency
policy-based governance
power system security
privacy
privacy concerns
privacy preserving fine-grained data distribution aggregation
pubcrawl
Public key
real-time fine-grained monitoring
real-time systems
parent smart meter
Smart Grid
smart grid AMI networks
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Metering
smart meters
smart power grids
Topology
fine-grained consumption
collected metering data
Companies
consumption distribution
data privacy
distribution
energy consumption
energy consumption data
energy demand forecasting
fine-grained
advanced metering infrastructure
fine-grained metering data reporting
future energy production
Human behavior
individual consumers
intended demand response service
Metrics
network topology
network tree topology structure
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »