Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
biblio
Prioritization of MTTC-based combinatorial evaluation for hypothesized substations outages
Submitted by grigby1 on Tue, 03/07/2017 - 12:42pm
power system reliability
Topology
Substations
substation ranking
substation protection
S-select-k problem
risk management
risk indices
Reliability
randomly generated mean-time-to-compromise value
pubcrawl170109
combinatorial mathematics
power generation reliability
MTTC-based combinatorial evaluation prioritization
mean time to compromise (MTTC)
Indexes
IEEE standards
IEEE 30-bus system
hypothesized substation outage
cyber-contingency analysis
Computer crime
Combinatorial verification
biblio
Self-triggered coordination over a shared network under Denial-of-Service
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
Clocks
Computer crime
computer network security
cyber-physical systems
denial-of-service attacks
DoS attacks
DoS frequency
Jamming
network agents
persistency-of-communication
PoC
pubcrawl170109
self-triggered coordination
shared network
Time-frequency Analysis
Topology
biblio
"SRSC: SDN-based routing scheme for CCN"
Submitted by grigby1 on Tue, 02/21/2017 - 11:04am
Protocols
Topology
telecommunication network routing
SRSC
software-defined networking
software defined networking
SDN-based routing scheme
scalable routing scheme
Routing
pubcrawl170103
CCN
process control
Peer-to-peer computing
NS-3 simulator
network topology
IP networks
Internet traffic
internet
content centric network
clean-slate approach
biblio
"WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns"
Submitted by abfox on Tue, 02/14/2017 - 12:37pm
Markov Models
WAP
Topology
system survivability
Survivability
Steady-state
soft impacts
security community
security
scanning nodes
rejuvenation
quarantine
pubcrawl170101
probability
network topology
Mathematical model
advanced persistent threat
malware infections
malware
invasive software
infection probability
four-node topology
false positives
false negatives
early malware detection
critical infrastructures
critical infrastructure sectors
Critical Infrastructure Protection
coordinated massive malware campaign assessment
contagion probability
Analytical models
advanced persistent threats
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
biblio
Many-to-all priority-based network-coding broadcast in wireless multihop networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
priority-based deadlock prevention
wireless networks
wireless multihop networks
Wireless communication
Vectors
trees (mathematics)
Topology
telecommunication network topology
System recovery
radio networks
Protocols
broadcast
packet transmission
network coding
minimum transmission broadcast problem
maximum out-degree problem
many-to-all- with-network-coding MTB problem
Energy Efficiency
encoding
distributed many-to-all priority-based network-coding broadcast protocol
broadcast trees
biblio
Practical DCB for improved data center networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
NIC
Vegetation
transport protocols
Topology
Throughput
telecommunication traffic
telecommunication network topology
TCP-bolt
System recovery
switching networks
storage area networking
Routing protocols
Routing
Ports (Computers)
arbitrary network topology traffic
lossless Ethernet
Local area networks
line blocking head
improved data center network
Hardware
ECMP routing
deadlock-free routing scheme
DCB
data center bridging
computer centres
commodity data center switch
buffering delay
biblio
A temporal packet marking detection scheme against MIRA attack in MANET
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
packet marking
Topology
time behavior
Throughput
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing
resource constraint
physical security
packet transmission
packet radio networks
packet marking detection scheme
clustering
mobile ad-hoc network
mobile ad hoc networks
Misleading routing attack (MIRA)
misleading routing attack
MIRA attack
MANET
malicious nodes detection
IP networks
energy constraint operations
dynamic topology
delays
delay packet
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by BrandonB on Wed, 05/06/2015 - 9:41am
power distribution reliability
utility servers
Topology
smart power grids
smart meters
Smart Grids
smart grid deployment
Smart Grid
simulation
Servers
routers
Reliability
qualitative assessment
power system security
power engineering computing
advanced metering infrastructure
grid topology
electrical distribution networks
DoS-DDoS attacks
DoS
distribution system reliability
distributed denial-of-service attacks
DDoS
cyber attack impact
cyber attack
critical smart grid infrastructures
computer network security
Computer crime
AMI
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »