Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communication networks
biblio
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
internet
traffic classifier
telecommunication traffic
Servers
Resiliency
resilience
pulse wave type DDoS-attack prevention
pubcrawl
network technologies
Network
Metrics
IP networks
botnet
Human behavior
firewalls
firewall
dpi
DDoS Attack Prevention
DDoS attack detection
DDoS
Computer crime
composability
Communication networks
biblio
Vulnerability Assessment Method for Cyber Physical Power System Considering Node Heterogeneity
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
hierarchical system
Communication Network
complex network theory
cyber physical power system
different weighting factor
Dispatching
equilibrium
heterogeneity evaluation index system
hierarchical CPPS model
complex networks
island survivability
islanding survivability
network structure
node heterogeneity
short-term operation
vulnerability assessment method
power grid vulnerability analysis
Entropy
pubcrawl
Metrics
Resiliency
composability
Indexes
Communication networks
vulnerability assessment
power engineering computing
resilience
power system faults
Power system protection
network theory (graphs)
Power Grid
power grids
power flow
distributed system
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
biblio
Dagger: Modeling and visualization for mission impact situation awareness
Submitted by Katie Dey on Mon, 09/09/2019 - 2:14pm
HMT
visualization framework
visualization
security
network security data context
network security
modeling framework
modeling
mission impact situation awareness
mission impact assessment
Knowledge representation
Interactions
Human Machine Teaming
C3E 2019
decision-making
Data visualization
data visualisation
Data models
Dagger framework
Cyberspace
cyber situation awareness
Context modeling
Context
computer network security
Computational modeling
Communication networks
Cognitive Security
Articles of Interest
Human Machine Teaming
Interactions
C3E 2019
biblio
Overview on Moving Target Network Defense
Submitted by aekwall on Mon, 09/09/2019 - 10:47am
Scalability
Predictive Metrics
Space exploration
route mutation
research hotspot
port mutation
numerous related works
multiple mutation
MTND
MTD
moving target network defense
IP address and port mutation
IP address
fingerprint mutation
security of data
network level
Fingerprint recognition
Communication networks
internet
Synchronization
pubcrawl
Resiliency
network security
moving target defense
security
IP networks
computer network security
biblio
Modeling and Analysis of Cascading Failures in Interdependent Cyber-Physical Systems
Submitted by grigby1 on Mon, 08/26/2019 - 11:06am
Power system protection
large-scale failures
Metrics
network parameters
network theory (graphs)
novel interdependent system model
Numerical models
physical network
power system faults
intricate dependencies
pubcrawl
resilience
Resiliency
Robustness
Scalability
security of data
system robustness
Analytical models
intra-dependency
interdependent cyber-physical systems
interdependency model
integrated cyber-physical systems
initial flow
Human Factors
Human behavior
failure analysis
cyber-physical systems
cyber-network
Cyber Dependencies
Compositionality
complex networks
Communication networks
Cascading Failures
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Network Security Situation Awareness for Industrial Control System Under Integrity Attacks
Submitted by grigby1 on Thu, 05/09/2019 - 10:45am
novel security situation awareness framework
telecommunication security
system state estimation
state estimation
situation prediction algorithm
Situation Awareness
Sensor Systems
scalable
Scalability
Resiliency
resilience
pubcrawl
process control
Prediction algorithms
particle filtering (numerical methods)
particle filtering
Networked Control Systems Security
nonlinear systems
network security situation awareness
malicious attacks
local estimator
integrity attacks
integrated circuits
Industrial Control Systems
industrial control system network
industrial control system
industrial control
hazard situation detection
control systems
computer network security
Communication networks
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
Dynamic Traffic Control System Using Edge Detection Algorithm
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
Traffic congestion
road traffic control
road vehicles
Roads
Scalability
security
smart city-smart travel
smart phone applications
smart phones
Resiliency
traffic engineering computing
Traffic light
traffic monitoring
traffic signal lights
transport network
vehicles
vehicular queuing
Workstations
Image edge detection
Communication networks
composability
congestion frequency detection
digital image processing techniques
dynamic traffic control system
edge detection
edge detection algorithm
electronic sensors
Cameras
Image Processing
image sequence
image sequences
magnetic coils
Metrics
pubcrawl
queueing theory
resilience
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »