Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Ports (Computers)
biblio
Detecting and Analyzing Zero-Day Attacks Using Honeypots
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
computer network security
IP networks
security
Protocols
invasive software
Resiliency
pubcrawl
composability
security vulnerability
Zero-day attacks
Virtual machining
computer network
Predictive Metrics
malware
virtual machine
virtual machines
operating systems
zero-day attack detection
Dictionaries
honeypot
honeypot system
information security domain
intrusion detec- tion/prevention system
Ports (Computers)
Snort intrusion detection system
Snort intrusion prevention system
zero-day attack analysis
Zero Day Attacks and Defense
biblio
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation
Submitted by grigby1 on Wed, 11/14/2018 - 12:19pm
Attack Tree Analysis
confidential information abuse
confidential information leakage
Cryptography
data privacy
Engines
expert systems
Human Factors
Ports (Computers)
privacy
privacy preserved rule-based risk analysis
privacy protection
Protocols
Prototypes
pubcrawl
Random access memory
risk analysis
Scalability
secret sharing
secure multiparty computation
secure risk analysis method
Servers
biblio
Detection of malicious nodes in NDN VANET for Interest Packet Popple Broadcast Diffusion Attack
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
Analytical models
Human behavior
Interest Packet Popple Broadcast Diffusion Attack
internet
markov chain
Markov processes
Mitigation strategy
Named Data Network Security
named data networking
NDN VANET
next generation networks
packet popple broadcast diffusion attack
PBDA
Ports (Computers)
Predictive models
pubcrawl
resilience
Resiliency
Roads
Scalability
telecommunication security
vehicular ad hoc networks
Vehicular Ad-hoc Network
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
blockchain
Cryptography
data integrity
data management
data management system
Databases
digital signatures
file organisation
Hash Function
Human behavior
Internet of Things
IP networks
Named Data Network Security
Peer-to-peer computing
Ports (Computers)
Proof-of-work
pubcrawl
Public key
resilience
Resiliency
Scalability
searching system
Security Properties
Servers
signature
simulation
telecommunication security
biblio
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Submitted by el_wehby on Fri, 05/25/2018 - 2:47pm
AP-assisted broadcast traffic management
Central Processing Unit
computer network management
energy conservation
energy consumption
HIDE system
high power active mode
IEEE 802.11 Standard
network capacity
Nexus One
packet round-trip time
Ports (Computers)
Power demand
Protocols
smart phones
smartphone energy saving
suspend mode
telecommunication power management
telecommunication traffic
trace-driven simulation
Unicast
WiFi broadcast frames
WiFi energy consumption
wireless LAN
1536086
biblio
Design and Verification of a Novel IoT Node Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:21am
Compositionality
dynamic reconfigurable features
field programmable gate arrays
Hardware
intelligent features
Internet of Things
IoT
IoT node protocol verification
Microprocessors
Policy
policy-based collaboration
Ports (Computers)
privacy
protocol verification
Protocols
pubcrawl
Servers
Switches
transport protocol
transport protocols
Verilog
wireless sensor networks
biblio
A Trust Management Framework for Network Applications within an SDN Environment
Submitted by grigby1 on Wed, 05/09/2018 - 2:02pm
Aerospace electronics
authentication
authorisation
authorisation permissions
authorization
computer network security
control systems
Metrics
network applications
network behaviour
network resources
Ports (Computers)
pubcrawl
Reliability
resilience
Resiliency
Router Systems
Router Systems Security
SDN
SDN environment
security
software defined networking
trust
Trust management
Trusted Computing
biblio
DAS: An Efficient NoC Router for Mixed-Criticality Real-Time Systems
Submitted by grigby1 on Wed, 05/09/2018 - 2:01pm
computer architecture
cycle-accurate SystemC NoC simulator
DAS
delays
double arbiter and switching router
high-critical flows
low-critical flow
MCS
Metrics
mixed-criticality systems
multiple virtual channels
multiprocessing systems
network routing
network use rate
network-on-chip
NoC router
Ports (Computers)
pubcrawl
real-time systems
resilience
Resiliency
Router Systems
Router Systems Security
security
Software
Store And Forward
Switches
virtual channel
Wormhole
wormhole and store and forward technique
worst-case communication latency
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
Cloud Computing
cloud environment
Cloud Security
cloud-computing technology
collaboration
composability
computer architecture
cost services
Dynamic Malware Analysis
Honeypot Network
honeypot networks
Intrusion Detection
invasive software
malicious attacks
malware
Malware Analysis
network intrusion detection system
network intrusion detection systems
NIDS module
openstack
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Ports (Computers)
pubcrawl
sandboxing
sandboxing environment
Servers
Signature-based detection
Snort
biblio
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
adequate security mechanism
attack
authentication
communication protocols
computer network security
Cryptography
data privacy
Internet of Things
IoT developers
IoT device
IoT system
ISO
MQTT
MQTT communication protocol
MQTT implementation
MQTT protocol
MQTT system
Payloads
Ports (Computers)
protocol
Protocols
pubcrawl
Resiliency
Scalability
scenario
Security analysis
Security by Default
telecommunication security
Things devices
1
2
3
4
5
6
7
next ›
last »