Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security threat
biblio
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
Mathematical model
traditional network active security threat model
security
Safety
pubcrawl
process control
offensive differential game
network security threat
network security target
network attack and defense
network active security threat process
attack defense differential equation
Information systems
Games
Differential Games
Differential game
differential equations
defensive differential game
defense differential game theory
Control Theory
computer network security
Communication networks
biblio
Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
efficient service delivery
Switches
DDoS detection
Meters
data plane
denial-of-service attack
network resources
centralized controller
attack volume
OpenFlow protocol
network safe
network security threat
networking infrastructure
OpenFlow enabled SDN
UDP flooding
user datagram protocol
DDoS attack mitigation
composability
computer network security
DDoS
IP networks
software defined networking
DDoS Attacks
Resiliency
Human behavior
pubcrawl
Computer crime
Protocols
Metrics
internet
Entropy
OpenFlow
SDN
Bandwidth
biblio
A trusted measurement scheme suitable for the clients in the trusted network
Submitted by BrandonB on Thu, 04/30/2015 - 2:21pm
network security threat
trusted network connection
trusted network
trusted measurement scheme
trusted computing field
Trusted Computing
trust measurement scheme
static measurement
state measurement
real-time systems
real-time state measurement
real-time measurement support
real-time measurement
polynomials
access control technology
message authentication
identity privacy
Gold
fine-grained states
fine-grained security policy
fine granularity
dynamic measurement
data privacy
Complexity theory
authorisation
authentication mechanism
authentication
Area measurement