Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Network reconnaissance
biblio
Operating System Classification: A Minimalist Approach
Submitted by grigby1 on Wed, 08/11/2021 - 11:59am
composability
iOS Security
passive network reconnaissance
Operating system classification
Network reconnaissance
affiliation graphs
social networking (online)
operating systems
wireless networks
machine learning
Cybersecurity
Object recognition
Resiliency
resilience
Metrics
Human Factors
pubcrawl
IP networks
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 2:57pm
network intrusion detection system
Training data
Training
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
principal component analysis
networking technologies
Network reconnaissance
network packets
anomaly based IDS
network attack
machine learning
intrusion detection system
Intrusion Detection
IDS systems
Hidden Markov models
feature extraction
entropy based discretization technique
Entropy
discretization
computer network security
biblio
Combating TCP Port Scan Attacks Using Sequential Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:57pm
port scans
transport protocols
telecommunication traffic
TCP port scan attacks
TCP packet
TCP datagrams
sequential neural networks
Scalability
Resiliency
resilience
pubcrawl
attack reconnaissance tool
NMAP scan pcap files
Neural networks
neural nets
Network reconnaissance
learning (artificial intelligence)
general packetized traffic
computer network security
complex TCP classes
Communication networks
classification
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
Cloud Computing
Computer crime
control systems
denial-of-service attack
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Servers
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »