Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
Detection of Blackhole Attack in Wireless Sensor Network Using Enhanced Check Agent
Submitted by aekwall on Mon, 03/01/2021 - 3:45pm
Scalability
zigbee 802.15.4
Zigbee
wireless sensor networks
sensor security
Wireless Sensor Network
Wireless Mesh Network Security
Wireless communication
Throughput
security
Black hole attack
Routing
Resiliency
quality of service
pubcrawl
network security
Metrics
Internet of Things
composability
Blackhole attack
biblio
liteNDN: QoS-Aware Packet Forwarding and Caching for Named Data Networks
Submitted by aekwall on Mon, 02/22/2021 - 12:36pm
multipath forwarding
computing devices
conventional NDN forwarding
cooperative forwarding strategy
data retrieval latency
data significance
forwarding strategy
Heuristics
liteNDN
caching policy
NDN networks
NDN routers
network utilization
packet forwarding decisions
probability estimation
QoS-aware packet caching
QoS-aware packet forwarding
routing costs
named data networking
telecommunication traffic
Data Security
Resiliency
Human behavior
pubcrawl
internet
telecommunication network routing
quality of service
Scalability
network communication
cache storage
named data networks
in-network caching
data retrieval
cache hit rate
caching normal
biblio
DDoS Attack Detection and Mitigation at SDN Data Plane Layer
Submitted by grigby1 on Tue, 02/16/2021 - 11:57am
SDN specifications
programming
pubcrawl
Python
quality of service
resilience
Resiliency
SDN
SDN data plane layer
SDN data-plane
SDN environment
OpenFlow
Servers
Software
software defined networking
software-defined networking
Switches
telecommunication traffic
time 100.0 s to 150.0 s
virtualisation
written SDN application
forwarding plane
Automated Secure Software Engineering
centralized control point
composability
computer network security
control plane
DDoS Attack
DDoS attack detection
denial-of-service attack
distributed denial-of-service attack
DDoS attack mitigation
Human behavior
malicious traffic abnormal behavior
Metrics
network functions
network infrastructure
normal traffic
open daylight controller
Open vSwitch programmability feature
Opendaylight
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 12:37pm
convolutional neural networks
packet flows
networking related tasks
network traffic image orientation mappings
Internet traffic classification
deep convolutional neural networks
application network signatures
2-dimensional formulation
Network traffic classification
deep packet inspection
network administrators
Streaming media
deep learning
computer network security
quality of service
Bandwidth
machine learning
internet
neural nets
pubcrawl
Resiliency
learning (artificial intelligence)
Task Analysis
telecommunication traffic
Scalability
biblio
nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks
Submitted by aekwall on Mon, 01/11/2021 - 12:35pm
Virtual private networks
VPN/Non-VPN Traffic Characterization
traffic characterization
Per Application Classification
Multimedia Web sites
Application Identification
deep packet inspection
social networking (online)
deep learning
Scalability
convolutional neural networks
quality of service
internet
pubcrawl
Resiliency
feature extraction
Internet of Things
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 12:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
biblio
Additive and Subtractive Cuckoo Filters
Submitted by aekwall on Mon, 01/11/2021 - 12:32pm
ASCF
data deletion
subtractive cuckoo filter
subtraction operations
space-efficient data structures
space inflation
space efficiency
space cost
set membership queries
high-speed lookups
exclusive-OR operation
cuckoo hashing
cuckoo filters
bucket indexes
Bloom filters
Scalability
additive cuckoo filter
addition operations
Table lookup
Additives
Throughput
Fingerprint recognition
quality of service
Indexes
privacy
data structures
query processing
standards
pubcrawl
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »