Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network layer
biblio
Realizing Dynamic Network Slice Resource Management based on SDN networks
Submitted by aekwall on Mon, 10/05/2020 - 11:00am
network service features
control plane
SDN technology
control layer
customized services
dynamic network slice resource management
dynamic network slice resource scheduling
end-to-end network
multiple virtual networks
network management authority
telecommunication scheduling
network slicing framework
SDN monitoring
SDN networks
service quality
software defined networking (SDN)
streaming services
virtual network
Dynamic Networks and Security
Metrics
Internet of Things
Internet of Things (IoT)
computer architecture
computer network management
network layer
software defined networking
Resiliency
pubcrawl
composability
Cloud Computing
5G mobile communication
network slicing
Switches
Software Defined Network
5G
communication technology
Dynamic scheduling
data plane
biblio
Intelligent Architecture and Hybrid Model of Ground and Launch System for Advanced Launch Site
Submitted by aekwall on Mon, 06/01/2020 - 9:53am
Physical layer
internetworking
landing area
launch processes
launch system
launch systems
launch vehicle
middleware
middleware security
network layer
perception layer
Internet of Things
physical objects
policy-based governance
pubcrawl
resilience
Resiliency
security of data
sensors
Space vehicles
test operation
intelligent analysis assessment system
aerospace control
Application Layer
architectural framework
automatic control system crossing
Cloud Computing
command and control systems
composability
data processing system
flight payloads
advanced launch site system
intelligent architecture
intelligent command
intelligent control
intelligent elements
intelligent flight
intelligent functional architecture
intelligent launching region
intelligent system model
intelligent technical area
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
Metrics
trust level
telecommunication security
STAODV
service attack
security
secure trust based approach
Routing protocols
Routing
Resiliency
resilience
pubcrawl
participating node
network layer
network architecture
mobile ad hoc networks
adjacent nodes
MANET security
MANET force
MANET
malicious node
Conferences
Computational modeling
Compositionality
blackhole attack mitigation
Blackhole attack
Base stations
autonomous nodes
attack mitigation
AODV routing protocol
AODV based MANET
AODV
biblio
Evaluation and analysis of network coding at network layer
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
network topologies
XOR technique
wireless networks
Throughput
telecommunication network topology
Resiliency
resilience
real time performance metrics
pubcrawl
packet radio networks
packet delivery rate
composability
network layer
network coding
Metrics
end-to-end delay
encoding
delays
delay
Decoding
data communication
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
Infrastructure Mode Based Opportunistic Networks on Android Devices
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
Routing
Mobile communication
mobile computing
mobile network application
network layer
opportunistic networking
Opportunistic Networks
pubcrawl
resilience
Resiliency
mobile ad hoc networks
Routing protocols
Scalability
smart objects
smart phones
Smartphones
social behaviour
store-carry-forward principle
Wi-Fi
encryption
Android (operating system)
Android devices
android encryption
Androids
battery life
data packets
delay tolerant networks
delay-tolerant mobile networks
android
Human behavior
Human Factors
Humanoid robots
IEEE 802.11 Standard
infrastructure mode based opportunistic networks
intermittent node contacts
internet
Metrics
biblio
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Submitted by BrandonB on Thu, 04/30/2015 - 12:38pm
Inter-operable Heterogeneous Storage
trust boundaries
storage technologies
storage systems
storage management
Servers
Self Certifying File Systems
public keys
public key cryptography
Public key
Prototypes
network layer
Name Orientated Networking (NON)
IP networks
CCFS
integrity verification
information-centric networking
information networks
Information Centric Networks (ICN)
Google
File systems
file hashes
Delay Tolerant Networking (DTN)
cryptographically-curated file system
cryptographically strong content identifiers
Cryptographically Curated File System (CCFS)
Content Centric Networking (CCN)
content authentication