Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Network Monitoring
biblio
Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata
Submitted by grigby1 on Fri, 09/30/2022 - 8:42am
Probabilistic logic
Probabilistic Automata
Network Monitoring
IEC 104
Resiliency
IPFIX
ICS Anomaly Detection
traffic control
Semantics
security
automata
ICs
Protocols
Scalability
Integrated circuit modeling
resilience
pubcrawl
Anomaly Detection
biblio
A Semantic Machine Learning Approach for Cyber Security Monitoring
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
cyber-attacks
Stochastic Computing Security
stochastic styles
software technologies
semantic machine
Network Monitoring
information safety measure
digital global community
deterministic styles
destiny attacks
cyber- attacks
Cyber Attacks
cyber-threats
business processes
learning (artificial intelligence)
Computer crime
Data models
Scalability
Safety
Resiliency
resilience
pubcrawl
Monitoring
cyber security
machine learning
Training
security of data
biblio
Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
soft failures
optimization
Power Grid
power grids
power system faults
pubcrawl
recovery schedule
rescue missions
resilience
Resiliency
network recovery
software defined networking
Software Defined Networks
software-defined networking
System recovery
telecommunication network reliability
telecommunication network routing
telecommunication scheduling
telecommunication security
uncertainty
large-scale failures
communication infrastructure
Communication Network
Communication networks
congested links
disruptive routing framework
failure locations
failure recovery
interdependent networks
Knowledge engineering
Cascading Failures
maintenance engineering
Massive Disruption
massive failures
Monitoring
multiple interconnected networks
multistage recovery approach
natural disasters
Network Monitoring
network monitoring techniques
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Software-defined networking (SDN)
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
ongoing attacks
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
Internet connectivity
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Anomaly Detection
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
biblio
Programmable SoC platform for deep packet inspection using enhanced Boyer-Moore algorithm
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
SIMD
Program processors
Programmable SoC
pubcrawl
real-time on-line pattern search
real-time systems
resilience
Resiliency
Scalability
search problems
platform based design methodologies
string matching
system monitoring
system-on-chip
SystemC
TCP
TCP packets
Xilinx Zynq programmable SoC
Zynq
High-Le'vel Synthesis
Algorithm design and analysis
BM string search algorithm
Boyer-Moore
Boyer-Moore algorithm
computer network security
deep packet inspection
FPGA
Hardware
high level synthesis
Accelerator
high-level synthesis
Inspection
MISD parallelism
Network Monitoring
network security
parallel processing
Payloads
Platform Based Design
biblio
GINTATE: Scalable and Extensible Deep Packet Inspection System for Encrypted Network Traffic: Session Resumption in Transport Layer Security Communication Considered Harmful to DPI
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
resilience
pubcrawl
Resiliency
Scalability
deep packet inspection
Network Monitoring
biblio
Development of a mathematical model of the control beginning of DDoS-attacks and malicious traffic
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
internet
Training
telecommunication traffic
subsequent blocking
started attack
Servers
Resiliency
pubcrawl
Network Monitoring
mixed traffic
Metrics
Mathematical model
Malicious Traffic
Algorithm design and analysis
Human behavior
DDoS-attacks
DDoS-attack
DDoS attack detection
Data protection
Cybersecurity
control beginning
computer network security
Computer crime
composability
Clustering algorithms
Classification algorithms
biblio
Light at the Middle of the Tunnel: Middleboxes for Selective Disclosure of Network Monitoring to Distrusted Parties
Submitted by grigby1 on Wed, 08/02/2017 - 1:57pm
composability
Human behavior
Measurement
Metrics
Network Monitoring
Performance
privacy
pubcrawl
Resiliency
security
virtualization privacy
biblio
Identifying Encrypted Malware Traffic with Contextual Flow Data
Submitted by grigby1 on Tue, 05/30/2017 - 1:11pm
artificial intelligence security
composability
computational intelligence
encryption
machine learning
malware
malware classification
Metrics
Network Monitoring
pubcrawl
Resiliency
Transport Layer Security
windows operating systems security