Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IPsec
biblio
No-Sum IPsec Lite: Simplified and lightweight Internet security protocol for IoT devices
Submitted by grigby1 on Tue, 03/15/2022 - 1:16pm
Cryptography
ESP
Scalable Security
Internet security
integrity
IPsec
Sociology
public key cryptography
Protocols
tools
Scalability
Conferences
pubcrawl
IoT
authenticity
security
Cloud Computing
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
IKE protocol
word length 128 bit
Synchronization
security association attack
securing communications
SA
Protocols
network protocol
network communication domain
man in the middle attack
keys phase exchange
IPSec protocol
IPsec
Internet key exchange protocol
internet
chaotic cryptography
IKE
FPGA implementation
FPGA
field programmable gate arrays
DH-HEMTs
data phase transfer
Cryptography
Cryptographic Protocols
computer network security
chaotic cryptosystem solution
chaotic cryptosystem
chaotic communication
4-dimension chaotic system
pubcrawl
biblio
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning
Submitted by grigby1 on Wed, 11/04/2020 - 12:44pm
groupware
team working
teaching methods
teaching
student-centered education
soft skills
pubcrawl
professional skills
privacy
Logic gates
IPsec
guided inquiry collaborative learning materials
Guided inquiry
collaborative learning
Firewalls (computing)
firewalls
firewall
education
cybersecurity teaching
cybersecurity education
cyber physical systems
computer science education
computer aided instruction
Communication networks
Collaborative Work
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
Internet key exchange protocol
IPsec
4-dimension chaotic system
chaotic cryptosystem
chaotic cryptosystem solution
data phase transfer
FPGA implementation
IKE
IKE protocol
securing communications
keys phase exchange
man in the middle attack
network communication domain
network protocol
SA
security association attack
word length 128 bit
computer network security
IPSec protocol
chaotic cryptography
chaotic communication
Predictive Metrics
DH-HEMTs
internet
Cryptography
Synchronization
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
FPGA
field programmable gate arrays
biblio
Research on Improving Network Security of Embedded System
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
information technology
Servers
Resiliency
pubcrawl
promotion countermeasures
network security
network attack
mobile embedded systems
Metrics
IPsec
internet
authentication
embedded systems
embedded system network
Embedded System
embedded network security
computer technology
computer network security
composability
Communication networks
certification
brand-new computer technology
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 8:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
biblio
Trust-Based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
policy-based network administration
usability
trust-based performance evaluation
telecommunication security
Routing protocols
routing protocol design
Resiliency
resilience
quality of service (QoS)
quality of service
QoS
pubcrawl
psychology
Pragmatics
ART
Mobile handsets
mobile circumstantial network
mobile ad hoc networks
Metrics
MANET security
MANET
Loading
Learning management systems
key administration
IPsec
Internet Protocol Security (IPsec)
Cryptographic Protocols
Compositionality
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 12:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild
Submitted by aekwall on Wed, 05/01/2019 - 11:37am
Libraries
twist attacks
transport protocols
transport layer protocol
TLS handshake
standards
SSH hosts
Servers
server vulnerability
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Cryptographic Protocols
IPsec
invalid curve attacks
internet-wide scans
internet scanning
internet
HTTPS hosts
Elliptic curves
elliptic curve parameter downgrade attack
Elliptic curve cryptography
CurveSwap attack
curve validity checks
curve twist attacks
biblio
Realizing a Virtual Private Network Using Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 2:36pm
Human behavior
IPsec
Named Data Network Security
named data networking
pubcrawl
resilience
Resiliency
Scalability
vpn
1
2
next ›
last »