Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security architecture
biblio
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services
Submitted by grigby1 on Tue, 03/01/2022 - 4:35pm
5G mobile communication
5G security
complex networks
computer architecture
Conferences
Focusing
Medical services
Network Security Architecture
NFV Security
pubcrawl
resilience
Resiliency
SDN security
security architecture
Software
State based Security Attack Detection
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 1:13pm
industrial control
Information Reuse and Security
real-time Ethernet automation systems
PROFINET
open systems
automation-friendly security solution
operational technology
communication security
Compositionality
security requirements
information technology
computer network security
Local area networks
security architecture
automation
standards
pubcrawl
Resiliency
Industrial Control Systems
real-time systems
Protocols
security
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
biblio
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
pervasive augmented reality
virtual elements
ubiquitous computing
testing
security of data
security architecture
Scalability
resilience
pubcrawl
privacy architecture
privacy
pervasive large scale augmented reality games
pervasive computing
Application software
personal area networks
mobile computing
mobile augmented reality games
middleware architecture
middleware
Large-scale systems
information security
Human behavior
data privacy
computer games
computer architecture
augmented reality
biblio
Towards a Security Architecture for Protecting Connected Vehicles from Malware
Submitted by grigby1 on Fri, 08/28/2020 - 11:51am
Metrics
virtualisation
vehicle malware
vehicle ECUs
unexpected consequences
security architecture
security
Scalability
Resiliency
resilience
real-time operating system
pubcrawl
operating systems (computers)
operating systems
noncritical functionalities
mobile radio
attack surface
malware
life-threatening activities
invasive software
internet
infotainment system
control engineering computing
control critical vehicle functionalities
connected vehicles
connected vehicle software
computer architecture
automotive electronics
automobiles
automobile industry
attackers
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
biblio
Profiling of secure chat and calling apps from encrypted traffic
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
nonreadable contents
ios
android
chat and voice/ video app
chat apps
cryptograhically secure sessions
encrypted traffic
iOS mobile platform
network forensic
Windows
secure app
secure chat profiling
service provider networks
voice/ video apps
voice/ video calling apps
voice/ video calls
iOS Security
internet
Cryptography
Protocols
Trusted Computing
mobile computing
Resiliency
pubcrawl
Social network services
Metrics
Servers
Forensics
Data mining
security architecture
Human Factors
Android (operating system)
confidentiality
Compositionality
biblio
An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
security event database
intelligent defense
Network Security Architecture
pubcrawl
Resiliency
resource allocation
security
security architecture
security capability pool
security decision center
intelligent cyberspace defense architecture
security load
security of data
security payload
security resource allocation
Software
top-level security framework
unprecedented hard situation
versatile cyberspace
containerization technology
Metrics
Dynamic Networks and Security
aggregated security events
Cloud Computing
cloud computing platform
computer architecture
container library
containerization
composability
Containers
Cyberspace
decision rule base
dynamic container orchestration
Dynamic decision making
Dynamical Systems
elastic resource infrastructure
Hardware
biblio
A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
architectural design
structural design
security architecture framework
security architecture
security architectural framework
secured information systems
ring-based nested network zones
Nested Zones
N-tier/shared nothing system architectures
defense-in-depth approach
defense in depth
data centers
critical infrastructure
Attack Hops
security of data
network architecture
Network Security Architecture
critical information infrastructure
Guidelines
security attributes
Information systems
Software Architecture
standards
pubcrawl
Resiliency
computer architecture
security
biblio
The Research on IOT Security Architecture and Its Key Technologies
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
information processing
scientific information technology
IoT security architecture
information security system
information industry
economic development
Network Security Architecture
WSN
RFID
radiofrequency identification
security of data
security threats
security architecture
pubcrawl
Resiliency
information security
computer architecture
Internet of Things
technological development
1
2
3
next ›
last »