Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
A simulation model of a cloud data center based on traditional networks and Software-defined network
Submitted by aekwall on Tue, 03/08/2022 - 2:41pm
information science
Topology
Mininet
information resources
GNS3
data-center
data
Communications technology
model
named data networking
Data models
data centers
Network
Human behavior
Resiliency
pubcrawl
Analytical models
SDN
Scalability
Bandwidth
biblio
Large Scale Multimodal Data Processing Middleware for Intelligent Transport Systems
Submitted by grigby1 on Fri, 02/25/2022 - 1:32pm
security
pubcrawl
policy-based governance
collaboration
Topology
composability
Ontologies
Geometry
Scalability
middleware security
Data processing
Technological innovation
biblio
Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary
Submitted by grigby1 on Wed, 02/09/2022 - 2:49pm
Numerical models
anonymity
anonymous routing
Censorship resistance
composability
Costs
encryption
Human behavior
Metrics
Topology
overlay networks
privacy
pubcrawl
resilience
Resiliency
Routing
Routing protocols
biblio
Detection and Prevention of Blackhole Attack in AODV of MANET
Submitted by aekwall on Mon, 02/07/2022 - 5:08pm
clustering
manet attack prevention
Resiliency
Metrics
Compositionality
AODV
Black hole attack
Routing protocols
Topology
Routing
Conferences
MANET
MANET Attack Detection
mechatronics
mobile nodes
network topology
Partitioning algorithms
pubcrawl
biblio
Research on Impact Assessment of Attacks on Power Terminals
Submitted by grigby1 on Mon, 02/07/2022 - 4:44pm
power systems
Topology
telecommunication traffic
signal processing
Resiliency
resilience
Quantitative Indicators of Attack
pubcrawl
Power Terminal Security
application security
Power measurement
network on chip security
Microelectronics Security
Microelectronics
Metrics
composability
complex networks
Attack Assessment
biblio
Preventing Distributed Denial of Service Attacks in Software Defined Mesh Networks
Submitted by aekwall on Mon, 01/31/2022 - 4:15pm
Forensics
sFlow-RT
sFlow Collector
sFlow Agent
Policy Based Flow Management (PBFM)
network topology
flow tables
DDoS Attacks
Attack Detection and Mitigation
wireless mesh networks
Cloud Computing
denial-of-service attack
Firewalls (computing)
Topology
Redundancy
composability
Resiliency
Metrics
pubcrawl
SDN
biblio
6LoWPAN Performance Analysis of IoT Software-Defined-Network-Based Using Mininet-Io
Submitted by aekwall on Mon, 11/29/2021 - 1:55pm
Packet loss
Internet of Things
Switches
pubcrawl
Resiliency
composability
standards
testing
Throughput
6LoWPAN
Topology
Mininet-IoT
Onos controller
Software Defined Network
biblio
ML-based NIDS to secure RPL from Routing Attacks
Submitted by aekwall on Mon, 11/29/2021 - 1:53pm
security
IoT
Routing
Protocols
real-time systems
Conferences
pubcrawl
Resiliency
composability
Bibliographies
6LoWPAN
Topology
RPL
LLNs
NIDS for RPL
biblio
Sufficient and Necessary Condition for Resilient Consensus under Time-Varying Topologies
Submitted by grigby1 on Mon, 11/29/2021 - 1:33pm
\\ s$-robustness
Computational modeling
Human Factors
joint $r
malicious node
multi-agent systems
network topology
numerical simulation
pubcrawl
resilient consensus
Robustness
Scalability
Social Agents
switching topologies
time-varying systems
Topology
biblio
Trust Based Mechanism Using Multicast Routing in RPL for the Internet of Things
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
Resiliency
composability
Internet of Things (IoT)
Internet Protocol version 6 (IPv6)
Low-power and Lossy Networks (LLNs)
multicast communication
Multicasting technique
network topology
pubcrawl
resilience
Trust Routing
Routing Protocol for low-power and lossy networks (RPL)
Routing protocols
Scalability
security
Task Analysis
Throughput
Topology
trust mechanism
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »