Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transport protocols
biblio
Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:45pm
multiclass classification
transport protocols
Advanced Security Network Metrics & Tunneling Obfuscations dataset
anomaly-based intrusion detection system
anomaly-based Network intrusion detection systems
direct network intrusion
direct network intrusions
legitimate network traffic
legitimate TCP communications
network intrusion detection
multiclass classification baselines
multiclass classification NIDS
network intrusion detection system
obfuscated malicious TCP communications
obfuscated network intrusions
selected vulnerable network services
Signature-based Intrusion Detection System
learning (artificial intelligence)
Biological neural networks
Measurement
Neural networks
invasive software
pattern classification
computer science
composability
telecommunication traffic
Computational modeling
computer network security
Resiliency
resilience
Metrics
pubcrawl
feature extraction
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
multihop scenarios
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
content transfer
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
Libraries
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
computer network security
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
biblio
Hybrid Network Mobility Support in Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:34pm
Internet architecture
TCP/IP address
signalling protocols
signaling protocols
producer mobility
network mobility
Multi-layer neural network
location addresses
Internet connection
hybrid network mobility support
efficient network mobility support scheme
consumer mobility
data retrieval
mobile nodes
IP networks
information-centric networking
Face
NDN
named data networking
internet
Routing
Routing protocols
pubcrawl
Human behavior
Resiliency
transport protocols
Scalability
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
slow HTTP attack
Metrics
network flow data
network management complexity
Ping flood attack
pubcrawl
resilience
Resiliency
Servers
IP networks
software defined networking
Software Defined Networks
TCP flags
TCP SYN flood attack
telecommunication control
telecommunication traffic
transport protocols
distributed denial of service attack
botnet
composability
Computer crime
computer network management
computer network security
DDoS attack detection
denial-of-service attack
distributed denial of service
DDoS attack mitigation
distributed source
Entropy
Floods
HTTP attacks
Human behavior
internet
invasive software
biblio
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
transport protocols
dynamic networks
widespread open-source network monitoring tools
source network monitoring tools
real-world monitoring operations
protocol-specific deep packet inspection
protocol disambiguation
Protocol detection
monitoring systems
HTTP
Dynamic Protocol Detection mechanisms
Inspection
application layer protocol
Web servers
security of data
public domain software
network security
composability
Communication networks
Protocols
Conferences
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Monitoring
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
Modbus-TCP vulnerability
Industrial Control Systems
industrial firewall
Information Assurance
Intrusion Detection
Intrusion Detection and Prevention System
IP networks
malicious parameter command injection
Modbus TCP/IP protocol
industrial control and automation system security
Modbus/TCP
prevention systems
pubcrawl
real-time communication
refinery control
Scalability
transport protocols
DPI industrial firewall
Resiliency
composability
Predictive Metrics
attack mitigation
command injection attacks
deep packet inspection
denial of service attack
DPI capabilities
Networked Control Systems Security
firewalls
gas turbine operation
IDPS
IDPS-Snort
industrial automation control system
industrial automation control systems
industrial control
biblio
An adaptive approach for Detecting Blackhole using TCP Analysis in MANETs
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
security
mobile radio
multipath
ns2
popular attack
pubcrawl
recent few years
reliable transport layer protocol TCP
resilience
Routing protocols
mobile ad-hoc network
self-configuring
society amd researchers
TCP
TCP analysis
telecommunication network reliability
telecommunication security
transport protocols
unstructured networks
Blackhole attack
Resiliency
Metrics
Compositionality
ad hoc network
Ad hoc networks
adaptive approach
Adhoc network
AODV
manet privacy
central controlling authority
different circumstance
dynamic absence
information security
infra less environment
MANET
MANETs
mobile ad hoc networks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
A novel solution for securing robot communications based on the MQTT protocol and ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
ROS-enabled robotic systems
resilience
Resiliency
robot communications
Robot Operating System
robot operating systems
robot programming
robotic applications
robotic solutions
ROS
ROS-enabled robotic surveillance system
queueing theory
securing ROS-enabled robotic system
security
security of data
security threats
Servers
Service robots
telecommunication security
telemetry
transport protocols
medical robotic surveillance
automatic robotic surveillance
Data Security
delays
hijacking attacks
Human behavior
Human Factors
internet
IoT
man-in-the-middle attacks
authentication
Message Queuing Telemetry Transport protocol
mobile robots
MQTT
MQTT protocol
operating systems (computers)
Performance analysis
policy-based governance
Protocols
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »