Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
network links
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
communication confidentiality
composability
Cryptography
cyber physical systems
cyber security
deterministic network coding system
eavesdropper
encoding
Hash functions
Metrics
network coding
network links
network performance metrics
passive attacks
pubcrawl
random codes
random network coding system
Receivers
resilience
Resiliency
Routing
secure network coding system architecture
weak security
wired networks
wireless networks
wiretap attack
wiretap attacks
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Anomaly Detection
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Internet connectivity
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
ongoing attacks
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
Software-defined networking (SDN)
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
biblio
Individually-Secure Multi-Source Multicast
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
coding theory
common secure model
Compositionality
Cryptography
cut-set bound
eavesdropper
encoding
individually-secure multisource multicast
Metrics
multicast communication
Mutual information
network coding
network links
network topology
nonsecure MSM
pubcrawl
rate region
Reliability
resilience
Resiliency
secure MSM
security
SMSM
telecommunication security
zero mutual information