Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
routers
biblio
Improving the IDS Performance through Early Detection Approach in Local Area Networks Using Industrial Control Systems of Honeypot
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
Local area networks
industrial network security heads
industrial network systems
industrialized Early Intrusion Detection System
integrated circuits
intelligent manufacturing systems
internal industrial network
Intrusion Detection
Iptables
Iptables MikroTik
industrial installations
Monitoring
network security
production engineering computing
Protocols
pubcrawl
resilience
routers
Scalability
Servers
ICS Honeypot
Resiliency
Predictive Metrics
computer network performance evaluation
computer network security
control engineering computing
cybersecurity networks
Early Detection approach
Early Intrusion Detection System
honeypots
Router Systems Security
ICS SCADA
IDS performance
IDS Snort
industrial control
industrial control facility networks
industrial control system
Industrial Control Systems
industrial EIDS
Industrial honeypot
biblio
Anomalies Detection of Routers Based on Multiple Information Learning
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
privacy
telecommunication network routing
Syslogs
security of data
security
routers
Router Systems Security
router system
router syslogs
router security
router anomalies detection
Resiliency
resilience
pubcrawl
Anomaly Detection
multiple information learning
Metrics
learning (artificial intelligence)
learning
internet
input routers
feature extraction
Diagnostics
Correlation
computer network security
Computer bugs
communication devices
biblio
Protecting SDN controller with per-flow buffering inside OpenFlow switches
Submitted by K_Hooper on Wed, 05/09/2018 - 9:52am
software defined networking
per-flow buffering
process control
Protocols
pubcrawl
Resiliency
routers
Scalability
SDN controller
SDN security
Servers
packet-in flood
standards-compliant protocol
statistical analysis
switch flow tables
switch memory
table-miss
telecommunication control
telecommunication network routing
telecommunication switching
telecommunication traffic
working principles
DPDK
centralized controller
computer network security
control channel
control logic
control plane
control systems
data plane
denial of service
denial-of-service attacks
DoS attacks
buffer\_id feature
Floods
heavy control traffic conditions
individually buffered packets
IP networks
Monitoring
Open vSwitch
OpenFlow
OpenFlow protocol
OpenFlow switches
OpenFlow traffic
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
biblio
A novel service provisioning mechanism in content-centric networking
Submitted by grigby1 on Tue, 03/07/2017 - 12:04pm
Science of Security
CCN
content decoupling
Content-Centric Networking
in-network caching
IP network
named data
network mobility
network security
routers
scalable content distribution
service provisioning mechanism
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by BrandonB on Wed, 05/06/2015 - 9:41am
power distribution reliability
utility servers
Topology
smart power grids
smart meters
Smart Grids
smart grid deployment
Smart Grid
simulation
Servers
routers
Reliability
qualitative assessment
power system security
power engineering computing
advanced metering infrastructure
grid topology
electrical distribution networks
DoS-DDoS attacks
DoS
distribution system reliability
distributed denial-of-service attacks
DDoS
cyber attack impact
cyber attack
critical smart grid infrastructures
computer network security
Computer crime
AMI
biblio
Preserving the Anonymity in MobilityFirst networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:55am
mobile computing
user anonymity
Trusted Computing
trust issues
three-tiered approach
telecommunication security
telecommunication network routing
Routing protocols
Routing
routers
Public key
privacy preservation
privacy
MobilityFirst networks
AMF
MF networks
internet
GUID
GNRS
globally unique flat identifier
global name resolution service
future Internet architecture
data privacy
computer science
authorisation
anonymity preservation
anonymity in MobilityFirst
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by BrandonB on Fri, 05/01/2015 - 6:39am
power distribution reliability
utility servers
Topology
smart power grids
smart meters
Smart Grids
smart grid deployment
Smart Grid
simulation
Servers
routers
Reliability
qualitative assessment
power system security
power engineering computing
advanced metering infrastructure
grid topology
electrical distribution networks
DoS-DDoS attacks
DoS
distribution system reliability
distributed denial-of-service attacks
DDoS
cyber attack impact
cyber attack
critical smart grid infrastructures
computer network security
Computer crime
AMI