Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network infrastructure
biblio
Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error
Submitted by grigby1 on Mon, 07/31/2023 - 12:27pm
secret sharing
Fuzzy Cryptography
Image quality
PSNR
data hiding
Satellites
Data protection
Steganography
Fuzzy logic
pubcrawl
network infrastructure
Image edge detection
information security
Communication networks
Scalability
Resiliency
resilience
Metrics
biblio
DDoS Attack Detection and Mitigation at SDN Data Plane Layer
Submitted by grigby1 on Tue, 02/16/2021 - 11:57am
SDN specifications
programming
pubcrawl
Python
quality of service
resilience
Resiliency
SDN
SDN data plane layer
SDN data-plane
SDN environment
OpenFlow
Servers
Software
software defined networking
software-defined networking
Switches
telecommunication traffic
time 100.0 s to 150.0 s
virtualisation
written SDN application
forwarding plane
Automated Secure Software Engineering
centralized control point
composability
computer network security
control plane
DDoS Attack
DDoS attack detection
denial-of-service attack
distributed denial-of-service attack
DDoS attack mitigation
Human behavior
malicious traffic abnormal behavior
Metrics
network functions
network infrastructure
normal traffic
open daylight controller
Open vSwitch programmability feature
Opendaylight
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
advanced radio transmission
artificial intelligence security
wireless networks
transmitting antennas
networking techniques
mobile networks
MIMO communication
Intelligence slices
industrial network security
fifth-generation networks
channel prediction
autonomous network management
artificial intelligence technology
AI module
AI algorithms
security
5G networks
network infrastructure
neural network
wireless channels
Task Analysis
resource allocation
Prediction algorithms
telecommunication network management
telecommunication computing
5G mobile communication
telecommunication security
pubcrawl
Artificial Intelligence
biblio
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks
Submitted by grigby1 on Fri, 05/22/2020 - 1:12pm
modest client machine
video on demand
untrusted caches
traditional infrastructure-based content delivery networks
Resiliency
resilience
pubcrawl
peer-to-peer data transfers
Peer-to-peer computing
peer-assisted content distribution networks
peer-assisted CDN
network infrastructure
network accountability
cache accounting attacks
Metrics
malicious caches
lightweight cache accountability puzzle
internet
hybrid systems
deployment costs
content publishers
composability
CAPnet
cache storage
cache participation
biblio
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:14am
BitTorrent
peer to peer security
resource management
peer-to-peer networks
P2P protocol
network infrastructure
Leecher-to-Leecher transactions
incentive-based security model
incentive security model
incentive methods
Gnutella
fairness
computer network security
Network
Human Factors
Scalability
Metrics
Peer-to-peer computing
Protocols
pubcrawl
Resiliency
computer network management
security
Cryptography
biblio
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
obscuration technique
Logic gates
Metrics
moving target defense
moving target IPv6 defense
MT6D processor
network address
network infrastructure
network level
network packet processor
network processor
network time protocol listener
keyed access
operating system kernel
operating system kernels
personal area networks
Protocols
pubcrawl
Register Transfer Level network security processor implementation
Resiliency
Routing protocols
RTL development
system architectural design
system level functions
federal networks
application specific integrated circuits
ASIC
CISC architecture
Clocks
collaboration
complex instruction set computer architecture
composability
computer network security
cryptographic dynamic addressing
Encapsulation
Engines
application specific integrated circuit variant
FPGA
Hardware
hardware engine
HE-MT6D
Homeland Security Cyber Security Division
IEEE 802.3 Ethernet
Instruction sets
internet
IP networks
IPv6
ipv6 security
biblio
Advanced interest flooding attacks in named-data networking
Submitted by grigby1 on Wed, 02/21/2018 - 12:48pm
resilience
Monitoring
multicast communication
multicast communications
Named-Data Networking
network infrastructure
policy governance
Policy-Governed Secure Collaboration
pubcrawl
Metrics
Resiliency
Robustness
Routing protocols
security of data
specific DDoS attack
telecommunication security
unsatisfiable content requests
data-plane
advanced interest flooding attacks
clean slate
clean-slate Internet proposal
collaboration
complete attack model
computer architecture
Computer crime
computer network security
advanced IFA
Electronic mail
Human behavior
human factor
Human Factors
information-centric networking
Interest Flooding Attack
internet
biblio
Black hole attack prevention method using dynamic threshold in mobile ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
mobile ad hoc network
telecommunication security
security issues
security attack
Routing protocols
routing information exchange
Routing
Resiliency
pubcrawl
network infrastructure
mobile nodes
mobile ad hoc networks
Ad Hoc Network Security
MANET
malicious node
IP networks
Human Factors
Human behavior
fake routing information
dynamic threshold
data packets
composability
black hole node detection rate
black hole attack prevention method
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
IP networks
Semantics
Routing
Resilient Networks
Resiliency
Reliability
pubcrawl
Power Grid
overlay networks
North America
network infrastructure
Monitoring
malicious attacks
composability
IP infrastructure
intrusion-tolerant overlay implementation
intrusion-tolerant network service
intrusion tolerance
internet
high-value applications
global cloud
Europe
East Asia
critical infrastructure
computer network security
1
2
next ›
last »