Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Switches
biblio
Switching Topology for Resilient Consensus Using Wi-Fi Signals
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
Topology
societal integration
Switches
switching signal
switching topology
Sybil attack
sybil attacks
telecommunication network topology
telecommunication security
telecommunication switching
security
true graph
untrustworthy agents
untrustworthy transmissions
Wi-Fi signals
wireless channels
Wireless communication
wireless LAN
wireless sensor networks
wireless transmissions
multirobot team security
Communication system security
composability
connected topology
graph theory
initial topology
legitimate agents
Metrics
multi-robot systems
multiagent consensus
arbitrary malicious node values
network topology
physical networks
physical properties
probability
pubcrawl
resilience
Resiliency
resilient consensus
biblio
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
pubcrawl
logic locking method
malicious circuits
million-gate circuits
outsourcing
PCA-based HT detection methods
power analysis-based Trojan detection
power consumption
power consumption analysis
Power demand
principal component analysis
Process Variations
logic locking
resilience
security
semiconductor companies
small sub-circuit collection
supply chain security
Switches
system-on-chip
trojan horse detection
Trojan horses
untrustworthy fabs
hardware Trojan detection
policy-based governance
composability
IP piracy
circuit block extraction
circuit power
cyber physical systems
design for hardware trust
fabrication foundries
gate level
Hardware
Hardware Security
Resiliency
hardware Trojan threat
HT activity
HT power
HT-infected circuits
industrial property
integrated circuit layout
intellectual properties
invasive software
IPS
Logic gates
biblio
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Routing
white-box switch
white visor
white box cryptography
Virtualization
virtualisation
virtual network
virtual machines
Virtual machine monitors
Switches
software-defined networking
software defined networking
composability
Resiliency
resilience
pubcrawl
Pipelines
networking fabrics
network virtualization
network topology
network management
network hypervisor
Metrics
computer network management
biblio
Risk and avoidance strategy for blocking mechanism of SDN-based security service
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
Monitoring
Switches
software-defined network
software defined networking
Security Risk Management
security
SDN-based Security Services
SDN-based security service
SDN security
SDN attack
Scalability
risk management
risk analysis
Resiliency
pubcrawl
Protocols
Dynamic Networks and Security
Metrics
malicious host
IP networks
IP forging
IEC standards
forged packets
forged IP address
dynamic network technology
data planes
cost-effective risk avoidance strategy
computer network security
blocking mechanism
attack scenario
composability
biblio
On Design and Implementation a Federated Chat Service Framework in Social Network Applications
Submitted by aekwall on Mon, 02/10/2020 - 12:08pm
Human Factors
Social Agents
user profiles
switching cost
social network applications
service requests
Messengers
federated chat service framework
chat services
Prototypes
Switches
Scalability
Standards organizations
chatbots
internet
social networking (online)
Facebook
privacy
pubcrawl
mobile computing
Organizations
biblio
Influence of Deactivated Agents in Social Networks: Switching Between French-De Groot Models and Friedkin-Johnsen Model
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
control
Social Agents
social sciences
Remote control
geophysical techniques
Friedkin-Johnsen model
French-De Groot models
deactivation model
deactivated agents
De Groot
complex mechanism
Consensus
Scalability
Biological system modeling
Switches
Human Factors
distortion
network theory (graphs)
Mathematical model
Economics
social networks
social networking (online)
pubcrawl
biblio
Automatic Analysis of Critical Sections for Efficient Secure Multi-Execution
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
Noninterference Enforcement
Switches
static code analysis
static analysis
Semantics
security of data
security
resource requirements
Resiliency
resilience
reachability analysis
pubcrawl
program testing
Security Policies Analysis
Multi Execution
Monitoring
manual binary analysis
Lattices
hypersafety security policies
Human behavior
fully automatic critical section analysis
demand-driven secure multiexecution
DDSME
composability
Binary Analysis
biblio
Improve Iot Security System Of Smart-Home By Using Support Vector Machine
Submitted by aekwall on Mon, 01/27/2020 - 10:19am
Accuracy
windows (construction)
Windows
support vector machine algorithm
smart-home system
Network
motors
Internet of Things security system
human resources preservation
human resource management
electrical products control
electric motors
doors
domestic safety
civil engineering computing
building occupants safety
security
Predictive Metrics
Switches
self-learning
Unsupervised Learning
Design engineering
Databases
composability
pubcrawl
Resiliency
machine learning
support vector machine
Support vector machines
machine learning algorithms
Internet of Things
Monitoring
biblio
A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
IPv6 source address
telecommunication network management
Switches
source address authentication
software defined networking
Software Defined Network
Servers
SDN
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network addresses
Metrics
message authentication
access network
ipv6 security
IPv6 protocol
IP networks
Internet-connected devices
internet
hierarchical authentication mechanism
fine-grained security protection
encryption authentication
Cryptography
computer network security
computer architecture
composability
collaboration
authentication
biblio
SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
SDN switch
network security
normal forwarding method
policy-based governance
Protocols
pubcrawl
resilience
Resiliency
SDN controller
network attacks
SDN-Ti prototype
Servers
Software Defined Network
software defined networking
stateless address autoconfiguration protocol
Switches
telecommunication traffic
trusted ID-encoded address
IPv6 address assignment scenarios
attacker traceback
authentication
collaboration
composability
computer network security
Cryptography
internet
IP networks
attack incident
IPv6 addresses
IPv6 networks
ipv6 security
IPv6 testbed
Metrics
network accountability
network administrator
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »