Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
SDN-based multi-controller optimization deployment strategy for satellite network
Submitted by grigby1 on Tue, 02/16/2021 - 11:46am
load difference
satellite network
Satellites
network delay
network performance
adjacent low load controller
high load state
high-load state
high-load switch
idle state
satellite communication
low-load controller
multicontroller optimized deployment strategy
network topology high dynamic changes
normal state
optimize deployment
overload state
SDN-based multicontroller optimization deployment strategy
SDN-based satellite network controllers
dynamic networks
telecommunication traffic
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
security
Topology
composability
delays
pubcrawl
network security
telecommunication control
software defined networking
Switches
network topology
Software Defined Network
optimisation
telecommunication network topology
biblio
Performance Evaluation of Data Center Network with Network Micro-segmentation
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
security idea
network topology
network traffic
performance evaluation
performance evaluation results
pubcrawl
resilience
Resiliency
search engines
security
network microsegmentation
social networks
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Topology
zero trust security
zero trust security model
data center network
Cisco Application Centric Infrastructure
Cloud Computing
cloud-based applications
composability
computer centres
computer network performance evaluation
computer network security
data center infrastructure
zero trust
data center network performance
data centers
Data models
dynamic data center
dynamic networks
high-performance requirements
Metrics
micro-segmentation
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology
Submitted by aekwall on Mon, 01/25/2021 - 12:03pm
denial-of-service attack
mode-switching DoS attacks
k-connected graph
k-connected communication topology
DoS attack modes
distributed secure control
distributed event-triggered controller
distributed controller independent
distributed control schemes
denial-of-service (DoS) attacks
Decentralized Control
construction algorithm
CPSS
attack graphs
denial-of-service attacks
cyberattack
distributed control
telecommunication control
Communication channels
Laplace equations
Predictive Metrics
telecommunication network topology
Topology
security problem
graph theory
composability
pubcrawl
Resiliency
cyber-physical systems
computer network security
biblio
IoT Object Security towards On-off Attack Using Trustworthiness Management
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
Attack detection
trust value security
time 0.5518318 s
PHP database
On-offAttack
on-off attack
Object
MySQL database
trustworthiness management
IoT object security
MQTT
security of data
Topology
trustworthiness
network topology
authentication
SQL
Databases
composability
pubcrawl
Internet of Things
Servers
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
biblio
Raw Cardinality Information Discovery for Big Datasets
Submitted by grigby1 on Fri, 12/11/2020 - 2:00pm
HDFS
back-end Big Data systems
Big Data sets
Cardinality
data separation
elastic
elasticsearch
events
grafana
Pipelines
Java
logs
Map Reduce
parallel discovery data store infrastructure
raw cardinality information discovery
rocksdb
search queries
Metadata Discovery Problem
Cloud Computing
Data mining
Monitoring
pubcrawl
Metrics
resilience
Resiliency
Conferences
Scalability
data analysis
Topology
Big Data
metadata
microsoft windows
Measurement
Compositionality
query processing
Hadoop
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
Predictive models
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
MEC-based IoT systems
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
IoT systems
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
alternate direction method of multipliers
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »