Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Contextual Factors Affecting Decisions About Intellectual Property Licensing Provisions in Collaboration Agreements for Open Innovation Projects of Complex Technological Organizations
Submitted by grigby1 on Mon, 11/02/2020 - 11:28am
open innovation
IP management capability
IP management strategies
IP networks
IP rights
joint product development
Licenses
licensing
open collaborative innovation strategies
open collaborative project
IP licensing terms
patents
policy-based governance
Procurement
pubcrawl
research collaboration
resilience
Resiliency
security of data
Technological innovation
critical IP access
collaboration agreements
collaborative research agreements
collaborative research project
collaborator IP
Companies
company-led research collaborations
composability
contextual factors
contracts
collaboration
industrial property
Industries
innovation management
intellectual property
intellectual property management
intellectual property security
IP access issues
IP licensing provisions
biblio
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 10:58am
mobile nodes
Throughput
threshold-based black hole attack prevention method
telecommunication security
security attack
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile radio
AODV
mobile ad hoc networks
mobile ad hoc network
Metrics
manet privacy
MANET
malicious node
IP networks
fake routing information
data packets
Compositionality
Black hole attack
biblio
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features
Submitted by aekwall on Mon, 10/12/2020 - 10:46am
collective attack behavior
Human Behavior and Cybersecurity
unique attack models
intrusion alerts
ground truth data
empirical cyberattack models
empirical attack models
dynamic generation
dynamic Bayesian approach
Dynamic attack models
critical cyber incidents
critical activities
corporate network
competition data
cyberattack
2017 National Collegiate Penetration
automated system
Aggregates
belief networks
Indexes
Analytical models
Cybersecurity
pubcrawl
Human behavior
feature extraction
Bayes methods
IP networks
security of data
biblio
Resilience Enhancement through a Multi-agent Approach over Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:11pm
IPv6 test-bed
ubiquitous computing
tangible physical world
sensors
Resiliency
resilience enhancement
resilience
pubcrawl
physical disturbances
multiagent framework
multiagent approach
multi-agent systems
Monitoring
middleware
actuators
IP networks
information technology
information technologies
distributed devices
cyber-physical systems
cyber vulnerabilities
cyber space perspective
cyber physical systems
CPS resilience
control systems
computer architecture
communication platforms
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
pubcrawl
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
light-weight traffic visualization system
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
external network traffic
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
acute attacks
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 10:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
An approach for host based botnet detection system
Submitted by grigby1 on Fri, 09/11/2020 - 11:08am
Metrics
modern malware
host-based intrusion detection system
botnet detection system
botnet attack detection
Biological cells
botnet
genetic algorithm
genetic algorithms
Compositionality
tools
botnets
invasive software
network security
intrusion detection system
computer network security
Resiliency
pubcrawl
IP networks
Intrusion Detection
biblio
Content Retrieval while Moving Across IP and NDN Network Architectures
Submitted by aekwall on Tue, 09/08/2020 - 9:16am
content retrieval
policy governance
clean slate
NDN network architectures
mobility scenario
IP network architectures
inter-network architecture mobility framework
heterogeneous Future Internet
content-based retrieval
IP networks
access networks
mobile nodes
mobility management (mobile radio)
internet
Metrics
pubcrawl
Human behavior
Resiliency
biblio
A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:00am
electricity grid
Chained Attacks
data injection attack scenario
attack models
PLADD
Cyber-physical security assessment
bad data injection
attack propagation
attack graph
markov chain
cyber-physical system
Power Grid
security of data
Markov processes
power system security
power engineering computing
password
power grids
pubcrawl
Resiliency
cyber-physical systems
Data models
Scalability
IP networks
biblio
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
Submitted by grigby1 on Fri, 09/04/2020 - 2:59pm
bitcoin
temporal spatio-temporal
spatial spatio-temporal
peer-to-peer transactions
partitioning
network dynamics
network distribution
logical partitioning attacks
decentralized network architecture
Bitcoin network
attack scenarios
bitcoin security
security of data
Distributed databases
Software
Human behavior
pubcrawl
Peer-to-peer computing
Organizations
blockchain
internet
Scalability
IP networks
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »