Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
firewalls
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
computer network management
distributed firewall application
firewalls
Firewalls (computing)
global network overview
Mininet
network architecture
network logic
Network reconnaissance
network topology
OpenFlow counters
pubcrawl
Reconnaissance
reconnaissance attack
resilience
Resiliency
Scalability
SDN architecture
SDN based environments
SDN controller
SDN-based solution
security policy
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Telecommunications
testing
biblio
Security Visualization and Active Querying for OT Network
Submitted by grigby1 on Mon, 01/25/2021 - 10:28am
active querying
Air gaps
air-gap
business network
comma separated value format
common event format
composability
computer network security
computer networks
cyber-attacks
Data collection
data visualisation
Data visualization
firewalls
Human behavior
Human Factors
internet
intrusion detection system
intrusion prevention system
Metrics
Monitoring
network behavior
network inclusion
network security
operational technology network
OT Network
physical objects
pubcrawl
real-time systems
resilience
Resiliency
security
Security Visualization
visualization
Workstations
biblio
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities
Submitted by aekwall on Mon, 01/11/2021 - 12:34pm
Intrusion Detection
attack mitigation
firewalls
IP networks
Scalability
Industrial Control Systems
transport protocols
Resiliency
pubcrawl
industrial control
prevention systems
denial of service attack
deep packet inspection
DPI capabilities
DPI industrial firewall
gas turbine operation
IDPS
IDPS-Snort
industrial automation control system
industrial automation control systems
industrial control and automation system security
industrial firewall
Intrusion Detection and Prevention System
malicious parameter command injection
Modbus TCP/IP protocol
Modbus-TCP vulnerability
Modbus/TCP
real-time communication
refinery control
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by grigby1 on Tue, 12/01/2020 - 12:47pm
Access controls
authorisation
Big Data
composability
cyber world
deep learning
deep learning algorithms
deep learning based intrusion detection system
dynamic intrusion detection mechanism
encryption mechanisms
firewalls
GPUs
graphics processing units
IDS
IDS on GPU
IDS system
information security market
Intrusion Detection
intrusion detection system
learning (artificial intelligence)
market computers
modern learning mechanism
neural nets
neural network approach
optimization functions
parallel computing
password protections mechanisms
pubcrawl
real-world operations
resilience
Resiliency
security breaches
biblio
Teaching Cybersecurity Using Guided Inquiry Collaborative Learning
Submitted by grigby1 on Wed, 11/04/2020 - 12:44pm
collaborative learning
Collaborative Work
Communication networks
computer aided instruction
computer science education
cyber physical systems
cybersecurity education
cybersecurity teaching
education
firewall
firewalls
Firewalls (computing)
groupware
Guided inquiry
guided inquiry collaborative learning materials
IPsec
Logic gates
privacy
professional skills
pubcrawl
soft skills
student-centered education
teaching
teaching methods
team working
biblio
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
Submitted by aekwall on Mon, 10/19/2020 - 11:07am
firewalls
Scalability
Cryptography
encryption
Access Control
secret keys
Protocols
Resiliency
pubcrawl
Firewalls (computing)
Resists
formal security analysis
attribute-based encryption
attribute-based encryption field
Charm library
compromised machine
CRF security protection
cryptographic reverse firewall
cryptographic reverse firewall concept
ex-filtration
MA-KP-ABE-CRF system
Multi-authority
multiauthority ABE scheme
multiauthority key-policy ABE scheme
multiauthority nonmonotonic KP-ABE scheme
non-monotonic access structure
nonmonotonic access structure
nontrivial combining nonmonotonic formula
Stephen-Davidowitz
Key Policy Attribute Based Encryption (KP-ABE)
KP-ABE
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
composability
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
dynamic security control architecture
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
industrial control system
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
pubcrawl
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
biblio
Implementation of Blockchain Based Distributed Web Attack Detection Application
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
Cryptography
blockchain
Distributed databases
pubcrawl
resilience
Resiliency
internet
composability
smart contracts
Metrics
Reliability
blockchain based web attack detection model
firewalls
signature based detection
signature based detection method
Stakeholders
web application firewalls
Web attack detection
web attack detection application
Web platforms
Web servers
web-based attacks
Co
command injection attacks
biblio
A Secured OpenFlow-Based Software Defined Networking Using Dynamic Bayesian Network
Submitted by aekwall on Mon, 08/24/2020 - 12:36pm
computer network security
firewalls
Protocols
Bayes methods
software defined networking
transport protocols
Resiliency
pubcrawl
composability
OpenFlow
Heuristic algorithms
Firewalls (computing)
Ryu controller
Hidden Markov models
belief networks
denial-of-service attack
distributed denial-of-service attack
dynamic bayesian network
emulated network
main standard protocol
programmable network protocol
secured OpenFlow-based software defined networking
state information
stateful firewall
Transport Layer Security
biblio
Intrusion Detection System Model Implementation against DDOS attacks
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
DDoS
IDS
firewalls
telecommunication traffic
Resiliency
Human behavior
pubcrawl
composability
Metrics
prevention systems
computer installation
DDoS Attacks
firewall policy
intrusion actions
intrusion detection methods
intrusion detection system model implementation
Snort
SNORT bandwidth traffic analysis
DDoS attack detection
1
2
3
4
5
next ›
last »