Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Internet connectivity
biblio
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Submitted by grigby1 on Mon, 03/23/2020 - 3:16pm
computer network security
cryptographic processing
Cryptographic Protocols
Cryptography
data privacy
end-to-end security
Internet connectivity
Internet of Things
IoT communication
IoT device owner
Metrics
protocol incompatibilities
Protocols
pubcrawl
resilience
Resiliency
resource-conserving access control
resource-constrained IoT devices
Router Systems Security
Routing
secret supply chain procedures
Servers
tailoring onion routing
telecommunication control
untrusted environments
untrusted networks
Web server
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Anomaly Detection
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Internet connectivity
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
ongoing attacks
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
Software-defined networking (SDN)
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
agile DDDAS
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
Crisis Management applications
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
Internet connectivity
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Scalability
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
biblio
Teaching and Training Cybersecurity as a Cloud Service
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
and cloud computing
CLaaS
Cloud Computing
cloud computing systems
cloud service
computer aided instruction
Computer crime
computer science education
cyber resources
cybersecurity experiments
cybersecurity lab as a service
cybersecurity teaching
cybersecurity training
education
educational courses
GenCyber camps
graduate students
Internet connectivity
Internet of Things
IoT
IT infrastructures
Network interfaces
Protocols
pubcrawl170109
security of data
Servers
virtual cloud services
virtual cybersecurity experiments
virtualisation
Virtualization
virtualization technologies
biblio
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
Submitted by BrandonB on Fri, 05/01/2015 - 8:12am
Apache Web server
Browsers
client-server environment
endpoint platforms
extended TLS
Internet connectivity
Mozilla Firefox browser
mutual attestation mechanism
platform integrity assurance
principal component analysis
Protocols
Remote Attestation
security
SSL-TLS protocol
Trusted Computing
trusted computing group
trustworthiness
Web browsers
Web servers
Web service security
web services
Web-based application