Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer networks
biblio
IoT Data Privacy via Blockchains and IPFS
Submitted by grigby1 on Mon, 03/05/2018 - 12:24pm
blockchain
computer networks
distributed access model
Human behavior
Human Factors
Internet of Things
Metrics
peer to peer security
privacy
pubcrawl
resilience
Resiliency
Scalability
biblio
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation
Submitted by grigby1 on Tue, 01/23/2018 - 3:01pm
Proactive Cyber Defence
infrastructure data analysis
Mission Assurance
mission-context information
near real-time defensive cyber operations
network operators
network responses
network topology
network-based CoA
network-based courses-of-action
Defence Research and Development Canada
pubcrawl
Resiliency
Responsive Cyber Defence
security
situational awareness
Software
Software Vulnerability Mitigation
vulnerability mitigation
Cyber Attacks
Automated computer network defence
Automated Cyber Defence
automated mission-oriented decision support
Automated Response Actions
composability
Computational modeling
computer architecture
computer network security
computer networks
ARMOUR
cyber defence integration framework
cyber defence science-and-technology platform
data analysis
Data models
data sources
Decision Making
decision support
Decision support systems
biblio
Integrated methods of information security in telecommunication systems
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
Redundancy
encoding
encryption processes
encryption system
gaming
gamma sequence
generic polynomials
integrated information transformation method
noise-immune coding
dynamical chaos generators
restricted access information
stealth
telecommunication system
timer coding
timer signal construction
unauthorized access
verification elements
signal processing security
chaos
pubcrawl
Resiliency
privacy
information security
encryption
composability
Cryptography
Generators
Metrics
chaos generators
computer networks
cryptographic strength
cryptographic transformations
cyclic codes
data encryption
dynamic chaos sequence
biblio
Multipath TCP: Analysis, Design, and Implementation
Submitted by grigby1 on Fri, 05/19/2017 - 1:11pm
computer networks
convergence
Metrics
Nonlinear dynamical systems
oscillating behaviors
pubcrawl
Resiliency
TCPIP
biblio
Risk Assessment of Cyber Access to Physical Infrastructure in Cyber-Physical Systems
Submitted by grigby1 on Mon, 04/03/2017 - 10:54am
composability
computer networks
CPS Privacy
cyber-physical systems
Cyber-security
Human behavior
Metrics
network control systems
network control systems security
networked control systems
pubcrawl
Resiliency
risk assessment
security
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
biblio
Flooding attacks detection in MANETs
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
MANET
traffic generation
telecommunication traffic
statistical analysis
security threats
RREQ flooding attacks
Routing protocols
Routing
route discovery
pubcrawl170109
mobile ad hoc networks
Ad hoc networks
IP networks
flooding attack detection
DoS
denial of service
computer networks
computer network security
Computer crime
AODV
ah hoc on-demand distance vector
biblio
DDoS attacks and countermeasures in cyberspace
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
Filtering
Vulnerability
transport protocols
TCP-IP model
Servers
pubcrawl170109
Protocols
mitigation
IP networks
internet
Floods
Computer crime
distributed denial of service attacks
DDoS Defense
DDoS attack mechanisms
DDoS Attack
Cyberspace
cyber-attack
cyber security
computer networks
computer network security
biblio
"Applying Formal Methods to Networking: Theory, Techniques, and Applications"
Submitted by grigby1 on Tue, 02/21/2017 - 11:11am
Internet community
Tutorials
software defined networking
Software
SDN
pubcrawl170103
Protocols
networking protocols
network infrastructure
Mathematics
Internet culture
applying formal methods
Internet architecture
internet
formal verification
formal specifications
formal correctness
Computers
computer networks
Communities
clean slate Internet design
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »