Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transport protocols
biblio
CUIF: Control of Useless Interests Flooding in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
safety related applications
content name
Control of Useless Interests Flooding
CUIF scheme
data
efficient communication environment
Interest forwarding storm
outgoing Interest packets
Producer vehicle
NDN
traditional host centric approach
vehicle address
Vehicular Ad-hoc Network
vehicular information network technology
Vehicular Named Data Network
Vehicular Named Data networks
VNDN
Named Data Network Security
Roads
Scalability
Servers
security
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
IP networks
VANETs
vehicular ad hoc networks
internet
VANET
Interest
named data networks
vehicular
biblio
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
nondesignated receivers
data reencryption
file transfer protocol
Formal Security Models
FTP-NDN
named data network
Named Data Networking (NDN)
NDN nodes
network flow requirement
data confidentiality
re-encryption
storage costs
TCP-IP networks
unknown potential receivers
usage amount
users
video services
Named Data Network Security
transport protocols
Scalability
Servers
telecommunication traffic
Cryptography
Access Control
Receivers
Protocols
computer architecture
computer network security
Resiliency
Human behavior
pubcrawl
internet
network traffic
ciphertext transmission
complete secure file transfer protocol
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
malicious services
Scalability
Human Factors
hypermedia
Botnet detection
conversation features
data flow features
DNS query
flow counting
flow similarity
hybrid technique
network traffic
multiple malicious codes
non-P2P traffic filtering mechanism
P2P botnet traffic detection
P2P traffic identification
P2P traffic similarity
peer-to-peer botnets
phishing links
two-stage detection method
two-stage traffic classification method
peer to peer security
feature extraction
Computer crime
computer network security
IP networks
telecommunication traffic
Protocols
invasive software
Classification algorithms
machine learning algorithms
transport protocols
network security
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
pattern classification
machine learning techniques
machine learning classifiers
Anomaly Detection
biblio
Analysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
operating systems
random key generation
Unix-like operating systems
TCP-IP layer
security protocol
secure socket layer
real-time clock
OpenSSL random number generation
open source library
noise source entropy
Noise
devrandom
cryptographic random numbers
cryptographic key generation
IP networks
OpenSSL
random number generation
Unix
public domain software
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
transport protocols
Cryptography
Scalability
biblio
Influence of Internet Protocols and CDN on Web Browsing
Submitted by grigby1 on Tue, 02/18/2020 - 11:56am
transport protocols
public websites
QUIC
QUIC/UDP protocols
resilience
Resiliency
Scalability
TLS/TCP protocols
tool Web View
Protocols
Web
Web browsing
Web Caching
Web contents
Web ecosystem
Web pages
Web servers
Web sites
HTTP/2 protocols
Alexa websites
CDN
CDN delivery
content delivery network
French Agency
french websites
Google
HTTP/2
pubcrawl
Human behavior
internet
Internet protocols
Loading
long-term measurement campaign
Metrics
monitoring website
Optical fiber networks
biblio
Features of Application of Data Transmission Protocols in Wireless Networks of Sensors
Submitted by aekwall on Mon, 02/17/2020 - 2:35pm
internetworking
secure IoT-solution mechanisms
radiotelemetry
publisher-subscriber architecture
protecting devices
network servers
messages
Message Queue Telemetry Transport protocol
gateways
device authentication protection
data transmission protocols
certificate-based authentication
data
queueing theory
sensor networks
protocol
computer network security
sensors
sensor security
authentication
internet
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
transport protocols
Software
Protocols
Internet of Things
biblio
A Residential Client-Side Perspective on SSL Certificates
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
shorter average chain length
public key infrastructure
residential client-side
resilience
Resiliency
root certificates
Scalability
secure web connection setup
Servers
public key cryptography
SSL certificate chains
SSL certificates
SSL Trust Models
telecommunication traffic
transport protocols
untrusted root certificate
valid certificates
2M residential client machines
Public key
pubcrawl
Protocols
operating systems
Metrics
invalid certificate chains
internet
Human Factors
Human behavior
Ecosystems
computer network security
certification
certificate characteristics
Browsers
35M unique certificate chains
biblio
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
telecommunication traffic
packet inter-arrival times
Presses
pubcrawl
search engine
search engines
search predictions
Servers
Side Channel
network traffic
timing
Traffic analysis
transport protocols
user query input field
Vulnerability
website
Web sites
keyboard input events
browser
Browsers
computer network security
HTTP requests
Human behavior
Human Factors
hypermedia
information leakage measurement
autocomplete
Keyboards
keylogging
keylogging side channel attack
keystroke analysis
keystroke timing attack
Metrics
Mutual information
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
Mobile impromptu systems
wireless gadget connections
Wireless communication
transport protocols
telecommunication traffic
Technological innovation
TCP-IP
steering conventions
self arranging system
Resiliency
resilience
pubcrawl
protocol
policy-based governance
pervasive computing
Base stations
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
IPV6 systems
ipv6 security
IPv6 MANET
IPv4 MANET
IP networks
Handheld computers
computer network security
composability
Communication system security
collaboration
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »