Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
Predictive Metrics
national cryptographic algorithm
network layer communication security
network security
Networked Control Systems Security
power distribution automation system
power distribution network system
power distribution protection
power engineering computing
power system security
Microelectronics Security
Protocols
pubcrawl
resilience
Resiliency
security protection scheme
sercurity chip
the power distribution automation system
Virtual private networks
VPN gateway
Distribution system
authentication function
authentication gateway
authorisation
composability
computer network security
Cryptographic Protocols
distribution application layer encryption authentication device
distribution master station
distribution network system
authentication
Dual Encryption
encryption
IP networks
IPSec protocol
IPSec security chip
Logic gates
master cipher machine
master system
Metrics
biblio
Determining a Security Roadmap for the Microelectronics Industry
Submitted by grigby1 on Wed, 09/11/2019 - 2:43pm
security
Microelectronics
microelectronics manufacturing industry
Microelectronics Security
microfabrication
process control
production engineering computing
pubcrawl
resilience
Resiliency
Metrics
security maintenance
security of data
security technology roadmap
smart manufacturing
standards
Supply Chain
supply chain management
technological forecasting
industrial property
Big Data
big data explosion
Cloud Computing
cloud-based solutions
composability
data sharing
data systems
electronic equipment manufacture
electronics industry
advanced process control efforts
Industry 4.0
industry-wide standards
information security
International Roadmap for Devices and System Factory Integration International Focus Team
IP networks
IP security
IRDS FI IFT
manufacturing
biblio
SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers
Submitted by aekwall on Mon, 09/09/2019 - 10:49am
SDN security
control systems
Controller dependency
delays
Distributed SDN controller
IP networks
moving target defense
Multiplexing
Predictive Metrics
pubcrawl
Resiliency
Scalability
security
software-defined networking
biblio
A Novel Route Randomization Approach for Moving Target Defense
Submitted by aekwall on Mon, 09/09/2019 - 10:48am
Monitoring
IP networks
software defined networking
moving target defense
Resiliency
pubcrawl
Routing protocols
network topology
control systems
Topology
Scalability
forwarding routes
route randomization
Software Defined Network
Time-frequency Analysis
Predictive Metrics
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 10:47am
secure communication links
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
message transmission
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
OpenFlow
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
computer network security
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
biblio
Overview on Moving Target Network Defense
Submitted by aekwall on Mon, 09/09/2019 - 10:47am
Scalability
Predictive Metrics
Space exploration
route mutation
research hotspot
port mutation
numerous related works
multiple mutation
MTND
MTD
moving target network defense
IP address and port mutation
IP address
fingerprint mutation
security of data
network level
Fingerprint recognition
Communication networks
internet
Synchronization
pubcrawl
Resiliency
network security
moving target defense
security
IP networks
computer network security
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Towards a security monitoring plane for named data networking and its application against content poisoning attack
Submitted by aekwall on Mon, 08/05/2019 - 10:44am
Measurement
security of data
security monitoring plane
security monitoring approach
security issues
security
Scalability
Resiliency
pubcrawl
NDN specification
NDN node
named data networking
Monitoring
microdetector
clean slate
IP networks
internet
Information Centric Networks
information centric networking paradigm
Hypothesis testing
Detectors
computer network security
clean-slate approach
Bayesian Network techniques
Bayesian network structure
Bayesian network
Bayes methods
Anomaly Detection
biblio
Improvement of security and scalability for IoT network using SD-VPN
Submitted by aekwall on Mon, 06/17/2019 - 10:29am
Protocols
VxLAN based tunnels
VxLAN
VPN tunnels
Virtual private networks
Temperature control
Software-Defined Virtual Private Network solution
software defined networking
service chaining
security scalability
security
SDN controller
SDN
SD-VPN solution
SD-VPN
pubcrawl
automobiles
overlay VPN nature
overlay VPN
OpenvSwitch
OpenFlow protocol
OpenFlow
Logic gates
IP networks
IoT network security
IoT network scalability
IoT application
IoT
Internet of Things
computer network security
composability
biblio
An Automata-based Security Policy Translation for Network Security Functions
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
Network Security Architecture
security policy translator
security policy translations
security policies
security of data
security controller
security
Resiliency
pubcrawl
Production
policy-based governance
Policy Translation
automata
IP networks
interface to network security functions
I2NSF user
I2NSF framework
Generators
Data models
Data mining
creating policies
computer network security
automata-based security policy translation
automata theory
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »