Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
computer networks
biblio
Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks
Submitted by grigby1 on Fri, 04/28/2023 - 4:01pm
complex networks
Complex Worm Networks
Colleges and Universities
Application software
policy governance
Resiliency
Buffer overflows
computer network security
computer theory
computer networks
Compositionality
collaboration
composability
Computational modeling
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
feature extraction
biblio
The Design and Realization of Information Security Technology and Computer Quality System Structure
Submitted by grigby1 on Fri, 04/28/2023 - 3:58pm
Routing
research and analysis
information security technology
Design and implementation
computer quality architecture
policy governance
Resiliency
computer theory
Design methodology
computer networks
Compositionality
computer architecture
composability
system-on-chip
Hardware
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
biblio
A Secured Botnet Prevention Mechanism for HTTP Flooding Based DDoS Attack
Submitted by grigby1 on Fri, 04/14/2023 - 4:00pm
Distribute Denial Of Service
Servers
Resource Request Rate
Resiliency
resilience
pubcrawl
network security
Metrics
maintenance engineering
Invisible Challenge
HTTP Flood Attacks
botnet
denial-of-service attack
DDoS Attacks
computer networks
computer network
Compositionality
composability
Companies
CAPTCHA
botnets security
Botnet Attacks
biblio
Developing a Scalable Network of High-Interaction Threat Intelligence Sensors for IoT Security
Submitted by grigby1 on Mon, 02/13/2023 - 2:58pm
IoT security
computer networks
honeypots
iiot
Industrial Internet of Things
Intelligent sensors
IoT
network measurements
network security
pubcrawl
Scalability
Scalable Security
security
Threat Intelligence Sensor
biblio
A Unique Deep Intrusion Detection Approach (UDIDA) for Detecting the Complex Attacks
Submitted by grigby1 on Fri, 01/13/2023 - 12:50pm
Support vector machines
Intrusion Detection
pubcrawl
resilience
Resiliency
Radio frequency
Scalability
Protocols
network security
deep learning
Intrusion Detection System (IDS)
Virtualization
Sensitivity
Security by Default
computer networks
software-defined network (SDN)
biblio
A Framework for Human Error, Weaknesses, Threats & Mitigation Measures in an Airgapped Network
Submitted by grigby1 on Fri, 01/06/2023 - 4:05pm
Human behavior
social networking (online)
Resiliency
resilience
Reconnaissance
pubcrawl
psycho-social
Organizations
Metrics
measurement uncertainty
scalable verification
Human
framework
Error
Data collection
Computer worms
computer networks
composability
air-gap networks
Air gaps
biblio
Exploit Security Vulnerabilities by Penetration Testing
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
DoS
White Box Test
Penetration Testing
Hashcat
dark web
Black Box Test
White Box Security
Kali Linux
Companies
DDoS
security
composability
Resiliency
Metrics
pubcrawl
information technology
Conferences
Computer hacking
computer networks
biblio
Research on enterprise network security system
Submitted by grigby1 on Fri, 11/25/2022 - 5:47pm
enterprise
Scalability
Science of Security
security
security system
situation assessment
complex systems
composability
computer architecture
computer networks
computer science
threat intelligence
Human behavior
Human Factors
Intrusion Detection
Metrics
network security
Policy Based Governance
pubcrawl
resilience
Resiliency
collaboration
biblio
Development of a Set of Procedures for Providing Remote Access to a Corporate Computer Network by means of the SSH Protocol (Using the Example of the CISCO IOS Operating System)
Submitted by grigby1 on Fri, 09/30/2022 - 3:55pm
operating systems
corporate computer network remote control
Cisco
ios
iOS Security
Resiliency
SSH
emulation
Mobile communication
computer networks
security
Resistance
Compositionality
Protocols
Software
resilience
Metrics
Human Factors
pubcrawl
biblio
A Truly Self-Sovereign Identity System
Submitted by aekwall on Fri, 09/30/2022 - 2:38pm
collaboration
privacy
computer networks
Protocols
Scalability
Conferences
pubcrawl
Resiliency
Human behavior
Peer-To-Peer
Government
Identity management
anonymity
identity management systems
Pseudonymity
Self-Sovereign Identity
1
2
3
4
5
6
7
8
9
next ›
last »