Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Scan chain based IP fingerprint and identification
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
intellectual property
Silicon
security
scan chain
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Metrics
ip protection
IP networks
IP identification
IP fingerprint
copy protection
integrated circuits
integrated circuit design
industrial property
identification technology
IC identification
fingerprinting techniques
Fingerprint recognition
fault coverage
fabrication
digital fingerprinting
digital fingerprint
delays
biblio
Modeling software defined security using multi-level security mechanism for SDN environment
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
packet features
vulnerable threats
thirdly controllers
Software Defined Security
Software Defined Networking support
software defined networking
security based challenges
secure controller
SDN-security
SDN environment
SDN architecture design
risk level
Resiliency
resilience
quality of service
pubcrawl
authentication
OpenFlow
nonbenign flow
Networked Control Systems Security
multilevel security mechanism
Metrics
Measurement
IP networks
fuzzy logic system
Fuzzy logic
flow packet
dual-fuzzy logic design
control systems
computer network security
composability
benign flow packets
biblio
Security-reliability tradeoff for cooperative multi-relay and jammer selection in Nakagami-m fading channels
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
Reliability
SRT
Physical layer security (PLS)
Nakagami-m fading
CJ
Resiliency
fading channels
Metrics
resilience
security
Relays
Jamming
Wireless communication
physical layer security
IP networks
composability
pubcrawl
biblio
Reducing Energy Waste for Computers by Human-in-the-Loop Control
Submitted by el_wehby on Fri, 05/25/2018 - 3:51pm
energy saving
Workstations
workstation
waste management
power aware computing
multilevel sensing strategy
IP networks
human-in-the-loop control
human-in-the-loop
Human Factors
human behavior understanding
energy waste reduction
energy waste
adaptive timeout interval strategy
energy management
energy conservation
distraction detection
distraction
cyber physical systems
CPS
Computer workstations
computer workstation
computer usage
computer
addressing background processing strategy
1536086
biblio
IPv6 Routing Protocol for Low-Power and Lossy Networks Implementation in Network Simulator \#x2014; 3
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
wireless sensor networks
Topology
telecommunication power management
RPL multiple instances
RPL
Routing protocols
Routing
reliable communication
pubcrawl
protocol verification
privacy
policy-based collaboration
Compositionality
physical environments
NS3
ns-3 implementation
network simulator
maintenance engineering
lossy networks implementation
lossy environments
Linear programming
IPv6 Routing Protocol
IP networks
Hardware
efficient energy management system
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
Protecting SDN controller with per-flow buffering inside OpenFlow switches
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
software defined networking
per-flow buffering
process control
Protocols
pubcrawl
Resiliency
routers
Scalability
SDN controller
SDN security
Servers
packet-in flood
standards-compliant protocol
statistical analysis
switch flow tables
switch memory
table-miss
telecommunication control
telecommunication network routing
telecommunication switching
telecommunication traffic
working principles
DPDK
centralized controller
computer network security
control channel
control logic
control plane
control systems
data plane
denial of service
denial-of-service attacks
DoS attacks
buffer\_id feature
Floods
heavy control traffic conditions
individually buffered packets
IP networks
Monitoring
Open vSwitch
OpenFlow
OpenFlow protocol
OpenFlow switches
OpenFlow traffic
biblio
Network economics of SDN-based infrastructures: Can we unlock value through ICN multicast?
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
network economics
Web and internet services
Unicast
software defined networking
SDN security
SDN infrastructure
Scalability
Routing protocols
routing infrastructures
Resiliency
pubcrawl
Protocols
performance evaluation
operator networks
Bandwidth
native IP multicast
multicast protocols
migration costs
lightweight multicast service delivery
IP-over-ICN deployments
IP networks
IP multicast delivery
Internet Protocol services
internet
information-centric networking principles
ICN multicast
Economics
computer network security
biblio
TARN: A SDN-based traffic analysis resistant network architecture
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
Scalability
network communications
Open vSwitches
PEERING BGP testbed
Peer-to-peer computing
pseudorandom IP addresses
pubcrawl
Resiliency
Routing
Routing protocols
large-scale traffic analysis resistant network support
SDN
SDN security
SDX solution
Software
software defined networking
TARN
telecommunication traffic
traffic analysis resistant network architecture
YouTube
Hidden Markov models
computer network security
customer-driven network services
customizable trustable end-to-end network services
destination IP prefix
destination networks
distributed software defined Internet exchange
DNS/IP filtering
end-to-end communication session
end-to-end network services
business model
intended destination AS's prefix
internet
Internet autonomous systems
Internet routing
IP addressing freedom
IP networks
IP prefixes
IPv4
IPv6
biblio
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs
Submitted by grigby1 on Tue, 05/01/2018 - 11:22am
Phishing
unsolicited e-mail
top-level domains security
top-level domains
TLDs security
statistical regression model
software metrics
Servers
security performance measurement
security
reputation metrics design
reputation metrics
regression analysis
phishing datasets
Computer crime
Measurement
malware datasets
malware
IP networks
invasive software
internet
intermediary incentives
Feeds
Ecosystems
domain name system
domain abuse
DNS ecosystem
cybercriminals
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
…
next ›
last »