Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ports (Computers)
biblio
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Ports (Computers)
zero day detection
Zero day attacks
testing
Software
SNIDS
signature based network intrusion detection
Servers
Reliability
Code injection
Payloads
NIDS
false alarm
exploits
digital signatures
computer security
computer network security
computer architecture
biblio
Practical DCB for improved data center networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
NIC
Vegetation
transport protocols
Topology
Throughput
telecommunication traffic
telecommunication network topology
TCP-bolt
System recovery
switching networks
storage area networking
Routing protocols
Routing
Ports (Computers)
arbitrary network topology traffic
lossless Ethernet
Local area networks
line blocking head
improved data center network
Hardware
ECMP routing
deadlock-free routing scheme
DCB
data center bridging
computer centres
commodity data center switch
buffering delay
biblio
TorWard: Discovery of malicious traffic over Tor
Submitted by BrandonB on Wed, 05/06/2015 - 12:56pm
malicious traffic discovery
Tor exit routers
Tor
telecommunication traffic
telecommunication network routing
spam
Servers
Ports (Computers)
Peer-to-peer computing
P2P traffic
Mobile handsets
malware
Bandwidth
malicious traffic categorization
Malicious Traffic
low-latency anonymous communication system
Logic gates
intrusion detection system
IDS alerts
IDS
DoS
denial-of-service attack traffic
Computers
computer network security
biblio
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:34am
large-scale network
statistical analysis
spamming
Servers
Protocols
Ports (Computers)
Phishing
passive monitoring
network measurement
malicious activities
load balancers
large-scale networks
botnets
IP networks
Internet Protocol
internet
Electronic mail
Educational institutions
domain name system
DNS-based security approaches
DNS
Databases
content delivery networks
computer network security
biblio
Analysis of a #x201c;/0 #x201d; Stealth Scan From a Botnet
Submitted by BrandonB on Wed, 05/06/2015 - 9:22am
animation
botnet
Communication system security
darknet
Geology
internet
Internet background radiation
Internet telephony
IP networks
network probing
Network Telescope
Ports (Computers)
scanning
Servers
Telescopes
VoIP
biblio
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Submitted by BrandonB on Wed, 05/06/2015 - 8:13am
content-centric networking architecture
unicast delivery
Unicast
Topology
semi-stateless forwarding scheme
Probabilistic logic
Ports (Computers)
ISP topologies
data structures
adaptive forwarding
Conferences
Computers
computer networks
computer architecture
CCN architecture
Bloom filter-based stateless forwarding
Bandwidth
biblio
Automatic generation of geographical networks for maritime traffic surveillance
Submitted by BrandonB on Tue, 05/05/2015 - 11:42am
Maritime Traffic Networks
Trajectory Mining and Synthetic Trajectories
Trajectory
Traffic
track reconstruction
surveillance
standards
security
route segments
Ports (Computers)
network nodes
maritime traffic surveillance
Anomaly Detection
Maritime Surveillance
maritime shipping lanes
Maritime Knowledge Discovery
marine systems
knowledge discovery process
Knowledge Discovery
historical vessel positioning data
hierarchical graph based representations
geographical maritime network
geographic information systems
automatic generation
biblio
SDN-based solutions for Moving Target Defense network protection
Submitted by BrandonB on Tue, 05/05/2015 - 10:14am
MTD
software-defined networking
Software Defined Networks
Servers
SDN-based solutions
SDN-based MTD methods
SDN
Reconnaissance
Ports (Computers)
Payloads
network-based MTD techniques
Algorithm design and analysis
moving target defense network protection
moving target defense
delays
countermeasures attackers
computer network security
Cisco onePK
Cisco One Platform Kit
central control point
attack surface obfuscation
biblio
Effectiveness of Port Hopping as a Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:12am
Analytical models
attacker success likelihood
Computers
moving target defense
network attacks
port hopping
Ports (Computers)
proactive defense
proactive defense technology
Probes
Reconnaissance
reconnaissance attack
security of data
Servers
service identity hiding
urn model
biblio
The price of virtualization: Performance isolation in multi-tenants networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:51am
online link utilization feedback mechanism
Virtualization
virtualisation
Substrates
Servers
resource management
resource allocation network
Ports (Computers)
OpenFlow protocol
address space isolation
network virtualization
multitenants datacenter network
Labeling
Internet evolutionary path
internet
flow space isolation
Bandwidth
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »