Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Improving the Efficiency of IDPS by Using Hybrid Methods from Artificial Intelligence
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
intrusion detection system
security
Reinforcement learning
pubcrawl
optimization
network and information security
multiagent systems
multi-agent systems
Monitoring
IP networks
intrusion prevention system
Intrusion Detection Systems
artificial intelligence security
hybrid methods
Fuzzy logic
cyber defense
Cryptography
computer networks security
computer network security
Computational modeling
computational intelligence
Compositionality
composability
Artificial Intelligence
biblio
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
Resiliency
NDN
node mobility
performance tuning
Policy
Policy Based Governance
policy governance
practical adoption
Protocols
pubcrawl
resilience
Named Data Networking (NDN)
stable connections
tactical applications
tactical edge networks
tactical environments
tactical networks
transport protocols
unreliable capacity limited performance
wireless nature
wireless sensor networks
ICN
application-specific extensions
clean slate
clean slate networking approach
collaboration
communication scenario
Engines
Face
fairly stable infrastructure-based environments
Human behavior
Human Factors
Ad hoc networks
information centric networking
Information-Centric Networking (ICN)
internet
IP networks
Metrics
military communication
mobile computing
mobile military networks
named data networking
biblio
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
potential physical impacts
aforementioned cyber-attacks
attack capabilities
command injection attack
Cyber-physical attacks
decentralized decision making capability
defense mechanisms
IEEE standards
packet drop attack
phasor measurement
command injection attacks
stealthy cyber-attacks
stealthy data manipulation attack
stealthy man-in-the-middle attacks
synchrophasor communication standard
synchrophasor devices
synchrophasor network security
synchrophasor technology
synchrophasor-based synchronous islanding testbed
synchrophasor-based systems
Global Positioning System
computer network security
intrusion detection system
IP networks
security
Software
real-time systems
Resiliency
pubcrawl
composability
security of data
malicious activities
Metrics
standards
Decision Making
Phasor measurement units
smart power grids
Smart Grid
power engineering computing
biblio
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
P2P bots
Spark
security
Scalability
Resiliency
resilience
pubcrawl
Periodicity Behavior Analysis
periodicity behavior
PeerGrep
Peer-to-peer computing
peer-to-peer botnets
peer to peer security
P2P hosts
P2P communications
botnet
P2P botnet
network security
Monitoring
Metrics
IP networks
IP addresses
invasive software
Human Factors
human factor
Human behavior
feature extraction
Conferences
computer network security
Botnet detection
biblio
Architecture Analysis and Verification of I3C Protocol
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
SoC
MIPI
Monitoring
Pins
policy-based governance
privacy
protocol verification
Protocols
pubcrawl
IP networks
system Verilog
test environments
Universal Verification Methodology
UVM
verification components
verification environment
VLSI
formal verification
back end design
base class library
Clocks
collaboration
composability
Compositionality
Conferences
digital integrated circuits
Aerospace electronics
front end design
hardware description languages
I3C
I3C bus protocol
improved inter integrated circuit
integrated circuit design
integrated circuit testing
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by grigby1 on Wed, 10/30/2019 - 10:52am
Licenses
ZMap
unintended IPv6 connectivity
sensitive data exposure
Security by Default
security
Scalability
RNA
Revere DNS (rDNS)
Resiliency
resilience
pubcrawl
privacy
principal component analysis
network scanning
Network reconnaissance
computer network security
large-scale security scans
IPv6 hosts
IPv6 address space
IPv6
IPv4 hosts
IP networks
internet-wide scans
Internet-connected devices
Internet of Things devices
Internet of Things
internet
integrated circuits
DNSSEC-signed IPv6 reverse zones
DNSsec
DNS
biblio
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
security policy implementation
expensive steps
flexible infrastructure IP
functional design flow
illustrative policies
industrial SoC
integrated circuit design
modern SoC design validation
off-the-shelf formal tools
Security Engine
efficient formal verification
simulation-based security verification
SoC Security
SoC security policies
SoC Verification
streamlined verification
system-level security policies
verification time
verification tools
Security Policies Analysis
Engines
Monitoring
IP networks
system-on-chip
pubcrawl
policy-based governance
Cryptography
tools
security architecture
Complexity theory
security of data
security policy
formal verification
alternative architecture
artifact
CAD
CAD flow
centralized infrastructure IP
complex steps
critical steps
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Quantifying & minimizing attack surfaces containing moving target defenses
Submitted by Katie Dey on Fri, 09/13/2019 - 5:48am
Measurement
timeliness violations
threat assessment
Surface treatment
security of data
security
Resilient Systems
Quantification
moving target defenses
modeling
Minimization
Analytical models
IP networks
Human Machine Teaming
dynamic proactive defenses
cyber security exposure
cyber security analysis
cyber friendly fire
Computational modeling
C3E 2019
attack surface minimization
Human Machine Teaming
C3E 2019
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »