Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Packet loss
biblio
Security of Networked Control Systems with Incomplete Information Based on Game Theory
Submitted by grigby1 on Wed, 02/03/2021 - 11:56am
IDS
telecommunication control
security
Scalability
resilience
pubcrawl
Packet loss
one-shot game
networked control systems
networked control system security
NCS
Monitoring
intrusion detection system
Industrial Control Systems
incomplete information based on game theory
Incomplete information
Networked Control Systems Security
Games
game theory
energy consumption
DoS attacks
Denial of Service attacks
cyber-physical systems
Control Theory
computer network security
belief networks
Bayes rule
Bayes methods
Predictive Metrics
composability
Resiliency
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Coupled or Uncoupled? Multi-path TCP Congestion Control for High-Speed Railway Networks
Submitted by grigby1 on Wed, 12/02/2020 - 1:00pm
Rail transportation
Wireless fidelity
uncoupled EWTCP algorithm
transport protocols
transmission performance
traffic flows categorisation
Throughput
telecommunication congestion control
Servers
Scalability
Resiliency
resilience
railway communication
congestion control algorithm
pubcrawl
Packet loss
on-board Internet services
multipath transmission control protocol congestion control
multipath TCP congestion control
multipath channels
Multi-Path TCP
Mice
high-speed railway networks
High Speed Railway
coupled congestion control
congestion window distribution
biblio
ctrlTCP: Reducing latency through coupled, heterogeneous multi-flow TCP congestion control
Submitted by grigby1 on Wed, 12/02/2020 - 12:52pm
Multiplexing
transport protocols
telecommunication congestion control
short flow completion times
Scalability
Resiliency
resilience
queuing delay reduction
queueing theory
pubcrawl
Packet loss
NS-2 simulations
Aggregates
multiple TCP connections
latency reduction
FreeBSD kernel
delays
ctrlTCP
Couplings
coupled heterogeneous multiflow TCP congestion control
coupled congestion control
Congestion Manager
Conferences
bandwidth allocation
biblio
An Efficient and Reliable Routing Protocol Using Bio-Inspired Techniques for Congestion Control in WSN
Submitted by grigby1 on Wed, 12/02/2020 - 12:51pm
network performance
wireless sensor networks
Wireless Sensor Network
telecommunication congestion control
Scalability
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
Packet loss
AODV protocol
network delay
delays
cuckoo search algorithm
coupled congestion control
congestion recognition
congestion problem
congestion free path
Congestion Control
congested resources
bioinspired techniques
artificial bee colony algorithm.
biblio
Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
Snort
QoS measurement
quality of service
resilience
Resiliency
SDN
SDN architecture
service comparison analysis
signature based detection method
QoS
Snort IDS
software define network architecture
software defined networking
telecommunication traffic
testing
Throughput
tools
pubcrawl
packet loss parameters
Packet loss
network quality
network activity
memory usage
intrusion detection system
IDS
existing network traffic
delays
CPU usage
computer network security
composability
bro IDS application
Bro
anomaly based detection method
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Performance Enhancement of Snort IDS through Kernel Modification
Submitted by aekwall on Mon, 10/26/2020 - 10:47am
NAPI throughput
telecommunication traffic
Task Analysis
Snort performance
snort packet handling capacity
Snort IDS
security of data
Resiliency
pubcrawl
Predictive Metrics
performance enhancement metrics
performance enhancement
Packet loss
operating system kernels
open-source intrusion detection system
composability
NAPI packet reception mechanism
Monitoring
Metrics
Measurement
Linux Operating System Security
Linux key parameters
Linux kernel networking subsystem
Linux
Kernel subsystem
kernel modifications
Kernel modification
Kernel
Intrusion Detection
high traffic load
biblio
Evolving AL-FEC Application Towards 5G NGMN
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
mobile multicast services
arbitrary packet losses
deterministic algorithms
error control
error protection schemes
FEC error control method
feedback free error recovery method
fifth generation mobile technology
forward error correction codes
Application Layer FEC codes
mobile multicast standards
mobile users
multicast communication
Multimedia communication
next generation mobilenetwork
online algorithms
randomized online algorithms
redundant data
source data
pubcrawl
composability
Metrics
Decoding
5G mobile communication
ultra-high reliability
next generation networks
encoding
Resiliency
telecommunication network reliability
forward error correction
Packet loss
5G Next Generation Mobile Networks
5G NGMN
AL-FEC policy online problem
AL-FEC protection
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 3:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
« first
‹ previous
1
2
3
4
5
next ›
last »