Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network traffic
biblio
Mining Information on Bitcoin Network Data
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
bitcoin
bitcoin security
Blockchain data
Data mining
Human behavior
human factor
Human Factors
IP networks
Market research
network traffic
Online banking
pubcrawl
Scalability
Servers
biblio
Toward resilient networks with fog computing
Submitted by K_Hooper on Fri, 02/02/2018 - 10:07am
IoT
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
core network
delays
Disruption Tolerance
edge computing
edge networks
Fog computing
Future Internet
Internet of Things
toward resilient networks
IoT architecture
network resilience
network traffic
ns-3 network simulation
on-demand computing power
Open-Fog
pubcrawl
Resiliency
Resilient Security Architectures
security
Survivability
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Reconnaissance of Industrial Control System by deep packet inspection
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
network protocol
Traffic classification
telecommunication traffic
Resiliency
Reconnaissance
pubcrawl
Protocols
Ports (Computers)
Payloads
network traffic
Network reconnaissance
Communication Network
integrated circuits
Inspection
Industrial Control System (ICS)
industrial control system
industrial control
electronic devices
Deep Packet Inspection (DPI)
deep packet inspection
complex system
biblio
ID2T: A DIY dataset creation toolkit for Intrusion Detection Systems
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
intrusion detection dataset toolkit
user defined synthetic attacks
telecommunication traffic
security of data
pubcrawl170109
Ports (Computers)
network traffic
network attacks
labeled dataset creation
IP networks
Intrusion Detection Systems
Computer crime
Intrusion Detection
IDS
ID2T
Entropy
DIY dataset creation toolkit
defense tool
Data visualization
data visualisation
Data mining
cyber-attacks
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 1:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
"Detectability of low-rate HTTP server DoS attacks using spectral analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:47pm
hypermedia
transport protocols
Temperature measurement
telecommunication traffic
Spectral analysis
Social network services
Servers
pubcrawl170101
operating systems
network traffic
Low-rate DoS attack
internet
Instruction sets
advanced persistent threat
HTTP server
HTTP 1.1
DoS flooding attacks
DoS attacks
denial-of-service attacks
computer network security
Computer crime
attack simulator
Attack detection
Apache HTTP Server software
Apache HTTP Server
biblio
Trustworthiness Management in the Social Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
network traffic
trustworthiness management
Trusted Computing
social networks
social networking concepts
social networking (online)
Social network services
social IoT
Social Internet of Things
reliable system
Reliability
Peer-to-peer computing
P2P networks
Analytical models
network scalability
Internet of Things
internet
information/service discovery
General
feedback exchange
distributed systems
distributed hash table structure
Computer Systems Organization
Computational modeling
Communication/Networking and Information Technology
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »