Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deep packet inspection
biblio
Multipath Traffic Engineering for Software Defined Networking
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IP networks
telecommunication traffic
Streaming media
software defined networking
service quality criteria
Scalability
Resiliency
resilience
quality of service
pubcrawl
Protocols
packet communication
network bandwidths
multipath traffic engineering
multimedia market
IPS
application-aware mechanism
Internet video sharing
internet
Inspection
IDS
Firewalls (computing)
firewall
dpi
deep packet inspection
control systems
communication bottlenecks
Broadcasting
broadcast television
bandwidth restrictions
ASA systems
biblio
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IIoT devices
typical IoT devices
security bootstrapping
Scalability
Resiliency
resilience
pubcrawl
Production facilities
performance evaluation
Payloads
manual device configuration
intranets
Internet of Things devices
Internet of Things
Inspection
industrial enterprise networks
authorisation
enterprise management
DPI-enabled intranets
DPI proxy certificate authority certificates
DPI proxy CA
DPI policies
deep packet inspection proxies
deep packet inspection
Cryptography
conventional computing devices
computer network security
computer bootstrapping
chicken-and-egg problem
certification
bootstrapping security configuration
biblio
Markov Augmented Neural Networks for Streaming Video Classification
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
Markov processes
video streaming services
video streaming
video signal processing
telecommunication traffic
streaming video classification
Scalability
Resiliency
resilience
pubcrawl
port scanning
Neural networks
neural nets
content providers
Markov Decision Process
Markov augmented neural networks
machine learning
IP networks
IP addresses
internet providers
internet
Inspection
image classification
deep packet inspection techniques
deep packet inspection
decision theory
biblio
A Study on Service Identification Based on Server Name Indication Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
pubcrawl
Transport Layer Security
TLS/SSL
telecommunication traffic
Service Name Indication (SNI)
service identification method
Service Identification
Server Name Indication analysis
security issues
Scalability
Resiliency
resilience
quality of service
computer network security
port numbers
IP networks
IP network flows
IP addresses
identification accuracy
dpi
Deeply Programmable Network (DPN)
Deep Packet Inspection (DPI)
deep packet inspection
current IP flows
Cryptography
biblio
Cybercrime Countermeasure of Insider Threat Investigation
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
DPI method
Scalability
Resiliency
resilience
pubcrawl
Organizations
Online banking
law enforcement
Inspection
insider threat investigation
insider threat
Big Data
digital investigation process
digital evidence
deep packet inspection methods
deep packet inspection
cybercrime threats
cybercrime investigation
cybercrime insider investigation
cybercrime countermeasure
Computer crime
biblio
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
deep packet inspection
feature extraction
Forestry
Inspection
Mathematical model
optimization
Protocols
pubcrawl
resilience
Resiliency
Scalability
supervised learning
biblio
Deep Packet Inspection in FPGAs via Approximate Nondeterministic Automata
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
high-speed computer networks
Throughput
telecommunication traffic
suspicious network traffic
Scalability
Resiliency
resilience
regular expression matching
RE matching
pubcrawl
network intrusion detection systems
multistage architecture
intrusion detection system
Internet connection
internet
Acceleration
Hardware
FPGA architecture
finite automata
field programmable gate arrays
deep packet inspection
computer network security
computer architecture
automata
architecture
approximate reduction techniques
approximate reduction
approximate nondeterministic FAs
approximate nondeterministic automata
biblio
Deep Packet Inspection Through Virtual Platforms using System-On-Chip FPGAs
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
resilience
virtual platforms
virtual platform
transaction level modeling
TLM
time-varying systems
time-domain analysis
system-on-chip FPGA
system-on-chip
system on chip
Software
search engines
Scalability
Resiliency
computer architecture
pubcrawl
Mentor Vista
logic design
Inspection
hybrid CPU/FPGA
hardware-IP based architecture
hardware accelerators
Hardware
field programmable gate arrays
ESL
deep packet inspection
CPU-DMA based architecture
biblio
Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
machine learning method
Training
telecommunication traffic
Scalability
Resiliency
resilience
quality of user service
pubcrawl
probability
Peer-to-peer computing
pattern matching
network traffic monitoring
network traffic identification method
network traffic identification
application traffic
machine learning algorithms
machine learning
learning (artificial intelligence)
Inspection
encryption
dpi
deep packet inspection technology
deep packet inspection
data analysis
Cryptography
computer network security
computer network management
biblio
A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
privacy-respecting Deep Packet Inspection
network payloads
organizational policies
passive proxying
Perfect Forward Secrecy
policy based framework
privacy
Privacy Policies
Privacy Requirements
privacy-aware techniques
Network connections
pubcrawl
Scalability
security solutions
semantic technologies
telecommunication traffic
TLS 1.3
unencrypted payloads
user access privileges
decryption
access decision
active proxying
attribute based access control
Attribute-based Access Control (ABAC)
big-data problem
computer network security
critical requirement
Cryptography
data privacy
Access Control
deep packet inspection
DPI analysis
DPI tools
fully encrypted data-transfer
high velocity network traffic
Human behavior
internet
malicious activity
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »