Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
research target
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
modern computing
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
Cyber-physical attacks
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
advanced communication technologies
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
Formal Modeling and Security Analysis for OpenFlow-Based Networks
Submitted by aekwall on Mon, 10/05/2020 - 11:53am
Semantics
Dynamic Networks and Security
topology-oriented operational semantics
point-to-point topology
Operational Semantics
openflow-based networks
formal OpenFlow-based network programming language
dynamic OpenFlow applications
dynamic flow rules
Switches
computer network security
Topology
Security analysis
network topology
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Context-Aware Privacy Preservation in a Hierarchical Fog Computing System
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
quality of service
Computing Theory and Privacy
multiple fog node communication
hierarchical infrastructure
hierarchical fog computing system
FOG computing environment
dynamic MDP-based privacy-preserving model
decentralized infrastructure
context-aware privacy preservation
content-aware applications
zero-sum game
Ethernet
Privacy Threats
Topology
security of data
Redundancy
network topology
pubcrawl
Human behavior
Resiliency
real-time systems
game theory
Protocols
distributed processing
Internet of Things
data privacy
Scalability
biblio
ObliComm: Towards Building an Efficient Oblivious Communication System
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
Servers
Receivers
security
pubcrawl
metadata
network topology
Scalability
Communication Systems
anonymous communication
horizontal scaling
modular framework
queuing theory
composability
biblio
Node Copying for Protection Against Graph Neural Network Topology Attacks
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
Topology
similarity structure
semi-supervised learning
prediction capability
node copying
graph topology
graph neural network topology attacks
graph convolutional networks
graph based machine
downstream learning task
detection problem
deep learning models
corruption
attack graphs
graph connectivity
Predictive Metrics
security of data
adversarial attacks
network topology
network theory (graphs)
Training
Prediction algorithms
Neural networks
neural nets
Computational modeling
graph theory
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
biblio
Survey on Fault Tolerance and Security in Mobile Ad Hoc Networks (MANETs)
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
Ad hoc networks
unipath routing
unipath protocols
multipath protocols
MBID
IDS for Mobile Ad hoc Networks
cooperative security
ABID
intrusion tolerance
network topology
Fault tolerant systems
mobile computing
telecommunication security
telecommunication network topology
mobile ad hoc networks
MANET
fault tolerance
Routing protocols
multipath routing
Routing
Protocols
composability
pubcrawl
Resiliency
biblio
A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case Study
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
SDNSynth framework
resiliency-aware deployment
resilient operation
satisfiability modulo theories
SCADA
SCADA network
SCADA systems
SCADA-based case study
SDN architecture
SDNSynth
resiliency requirements
Smart Grid
Smart Grids
smart power grids
software defined networking
supervisory control and data acquisition network
Switches
synthesis model
synthetic SCADA systems
systematic deployment methodology
legacy forwarding devices
budget constraints
computability
Control Theory and Resiliency
deployment plan
encoding
formal model
formal modeling
hybrid network
incremental deployment
pubcrawl
network synthesis
network topology
novel grid control operations
power engineering computing
programmable SDN-enabled switches
real-time data
resilience
Resiliency
biblio
Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
collaborative DDoS mitigation architecture
Topology
smart contracts
DDoS Attack
contracts
smart contract
private blockchain
software-defined networking
autonomous systems
SDN
DDoS
DDoS Prevention Service
distributed denial of service attack
DPS
network threat
Soft Defined Network
DDoS attack mitigation
Human behavior
computer network security
IP networks
telecommunication traffic
Cryptography
telecommunication security
security
software defined networking
Resiliency
Computer crime
pubcrawl
composability
Peer-to-peer computing
Metrics
blockchain
Distributed databases
network topology
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »