Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
Network Fingerprinting: Routers under Attack
Submitted by aekwall on Mon, 05/03/2021 - 1:10pm
attack
connectivity
Ecosystems
Hardware
internet
IP networks
network fingerprinting
ping
Predictive Metrics
Probes
pubcrawl
Resiliency
Router Systems Security
security
Topology
Traceroute
biblio
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
security
Software
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
vulnerabilities
Topology
Scalability
Software algorithms
Systematics
security risk assessment
attack graphs
belief networks
Bayesian networks
Probabilistic Graphical Models
biblio
An Information-centric NFV-based System Implementation for Disaster Management Services
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
mobile rescue operations
disaster recovery phase
flexible rescue group communication
ICN
information centric disaster management
information-centric disaster management system
information-centric network management
information-centric NFV-based system implementation
IP-based approach
low communication overhead
Disaster management
name-based interest-oriented communication approach
ndn nfv
network fragmentation
network infrastructure management
Seoul disaster management services
system implementation
Telephony
vICSNF
law enforcement
Scalability
virtualisation
computer network management
Resiliency
pubcrawl
internet
network topology
Topology
IP networks
Information Centric Networks
network function virtualization
container
hospitals
Gold
emergency management
openstack
connection-oriented communication
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
ConForm: In-band Control Plane Formation Protocol to SDN-Based Networks
Submitted by grigby1 on Tue, 03/16/2021 - 2:10pm
SDN-based networks
OpenFlow-based SDN networks
optical switches
policy-based approach
protocol design
Protocols
pubcrawl
resilience
Resiliency
network topology discovery
security
Self-establishment
software defined networking
TCPIP
telecommunication network topology
telecommunication traffic
Topology
transport protocols
In-Band Control Plane
bootstrap protocol
clean slate
clean slate architectures
collaboration
computer network management
data plane
Formal Specification
Human behavior
Bootstrap
In-band Control Plane Formation Protocol
inband control plane
IP networks
management plane activities
management plane related activities
Metrics
network startup
network topology
biblio
Trusted Connect Technology of Bioinformatics Authentication Cloud Platform Based on Point Set Topology Transformation Theory
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
Point Set Topology
zero trust
zero knowledge proof technology
trusted credentials
trusted connect technology
Trusted Computing
Topology
topological group transformation
Scalability
Resiliency
resilience
Public key
pubcrawl
policy-based governance
point set topology transformation theory
authentication
pattern recognition technology
Human Factors
Fractals
format conversion
Fingerprint recognition
feature data
digital coding
Cryptography
cloud platform
Cloud Computing
bioinformatics features
bioinformatics authentication cloud platform
bioinformatics
authorisation
biblio
Locality Guided Neural Networks for Explainable Artificial Intelligence
Submitted by aekwall on Mon, 03/01/2021 - 5:04pm
Semantics
training networks
Self-Organizing Map
Self-organizing feature maps
self-organising feature maps
locality guided neural network
current deep network architectures
AI methods
explainable artificial intelligence
CIFAR100 dataset
deep learning architecture
xai
Scalability
visualization
Topology
convolutional neural networks
network topology
convolutional neural nets
CNN
machine learning
Neurons
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Quantifying the impact of network congestion on application performance and network metrics
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
Degradation
work factor metrics
packet transmission statistics
network counters
modern high-performance computing systems
intensive MPI operations
HPC network architecture
dragonfly topology
Aries network
application performance
network congestion
network metrics
network architecture
message passing
Scalability
HPC
Processor scheduling
telecommunication network topology
parallel processing
Topology
computer networks
Measurement
telecommunication network routing
Correlation
pubcrawl
Resiliency
Conferences
biblio
Distributed Average Consensus Algorithm for Damage Assessment of Power Distribution System
Submitted by grigby1 on Tue, 02/16/2021 - 1:42pm
Damage Assessment
switch status
sensing units
power distribution system
PDS
outage
numerical simulations
IEEE 123-node test case
distributed consensus algorithm
distributed average consensus algorithm
disaster event
pubcrawl
communication capability
Agent
communication graph
Topology
disasters
distribution networks
distribution network
graph theory
Resiliency
resilience
biblio
RPL Assessment using the Rank Attack in Static and Mobile Environments
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
energy consumption
Damage Assessment
Static environment
rank attack
Mobility
mobile environment
Informatics
Technological innovation
RPL
security
Measurement
network topology
Topology
Resiliency
resilience
pubcrawl
IoT
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »