Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtualisation
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 10:33am
resilience
virtualization servers
virtualization server
virtualization environments
SDN-based security applications
SDN-based IDS
intrusion attacks
HTTP DoS attacks
HTTP DoS
SDN networks
SDN technology
denial-of-service attack
network traffic analysis
IDS
network intrusion detection system
cloud
Cloud Computing
Virtualization
Virtual machining
malicious software
virtualisation
Switches
software defined networking
SDN
Denial of Service attacks
telecommunication traffic
composability
web services
computer network security
Resiliency
pubcrawl
Servers
biblio
An Information-centric NFV-based System Implementation for Disaster Management Services
Submitted by aekwall on Thu, 04/08/2021 - 3:29pm
mobile rescue operations
disaster recovery phase
flexible rescue group communication
ICN
information centric disaster management
information-centric disaster management system
information-centric network management
information-centric NFV-based system implementation
IP-based approach
low communication overhead
Disaster management
name-based interest-oriented communication approach
ndn nfv
network fragmentation
network infrastructure management
Seoul disaster management services
system implementation
Telephony
vICSNF
law enforcement
Scalability
virtualisation
computer network management
Resiliency
pubcrawl
internet
network topology
Topology
IP networks
Information Centric Networks
network function virtualization
container
hospitals
Gold
emergency management
openstack
connection-oriented communication
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 12:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
DDoS Attack Detection and Mitigation at SDN Data Plane Layer
Submitted by grigby1 on Tue, 02/16/2021 - 11:57am
SDN specifications
programming
pubcrawl
Python
quality of service
resilience
Resiliency
SDN
SDN data plane layer
SDN data-plane
SDN environment
OpenFlow
Servers
Software
software defined networking
software-defined networking
Switches
telecommunication traffic
time 100.0 s to 150.0 s
virtualisation
written SDN application
forwarding plane
Automated Secure Software Engineering
centralized control point
composability
computer network security
control plane
DDoS Attack
DDoS attack detection
denial-of-service attack
distributed denial-of-service attack
DDoS attack mitigation
Human behavior
malicious traffic abnormal behavior
Metrics
network functions
network infrastructure
normal traffic
open daylight controller
Open vSwitch programmability feature
Opendaylight
biblio
Moving Bits with a Fleet of Shared Virtual Routers
Submitted by grigby1 on Tue, 12/01/2020 - 3:36pm
Scalability
Metrics
networking community
offloading network functionality
on-demand instances
Policy Based Governance
price disparity
Pricing
pubcrawl
resilience
Resiliency
IP transit prices
shared virtual routers
telecommunication network routing
telecommunication network topology
third-party cloud spot instances
traffic demands
transit providers
unit pricing
virtual network provider
virtualisation
Economics
bandwidth costs
Cloud Computing
cloud providers
cloud-assisted networks
collaboration
composability
computing resources
data transfer
data transfers
dedicated resources
Bandwidth
flexible network service chains
Human behavior
Human Factors
internet
Internet core hubs
Internet ecosystem
Internet-scale Computing Security
Internet-scale interconnections
IP networks
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
para-virtualization technique
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
operating systems
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
Virtual machining
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
security of data
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
ontology-based security model
Virtualization
virtualisation
ubiquitous computing
tools
testing
standards
security testing
security of data
Security Metrics
security assessment architecture
security aptitude
quantifiable security assessment process
pubcrawl
application configurations
ontology-based dynamic security assessment automation
Ontology
ontologies (artificial intelligence)
Ontologies
Metrics
metrics testing
Measurement
Dynamic Application Security Testing
critical infrastructure
context-aware security assessment automation
Business
automation
application security
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
biblio
SUPC: SDN enabled Universal Policy Checking in Cloud Network
Submitted by aekwall on Mon, 10/05/2020 - 10:59am
Protocols
virtualisation
Virtual private networks
SUPC
software defined networking
Software Defined Network (SDN)
Software Defined Network
SF rules
SF rule ordering overlaps
Service Function Chaining (SFC)
service function chain
Security Policy Conflicts
security breaches
SDN enabled universal policy checking
Resiliency
pubcrawl
Security Policies Analysis
policy conflicts
NFV
Network Function Virtualization (NFV)
network function virtualization
multitenant cloud networks
monitoring service functions
Middleboxes
Metrics
Firewalls (computing)
dynamic SFC composition
Dynamic Networks and Security
conflict checking mechanism
computer network security
composability
Cloud Computing
biblio
OFMTL-SEC: State-based Security for Software Defined Networks
Submitted by aekwall on Mon, 10/05/2020 - 10:54am
Switches
Dynamic Networks and Security
stateful security data plane solution
stateful data-plane protection designs
state-based SDN security protection mechanisms
OFMTL-SEC
NFV technologies
network function virtualization technologies
dynamic network security services
configuration-based attacks
ARP Spoofing
address resolution protocol
computer network security
Topology
Metrics
Protocols
composability
pubcrawl
Resiliency
software defined networking
security
virtualisation
network function virtualization
1
2
3
4
5
6
7
8
9
next ›
last »