Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Network reconnaissance
biblio
Effects of Topology Information on Routing in Contention-Based Underwater Acoustic Networks
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
Relays
Underwater acoustics
underwater acoustic networks
underwater acoustic communication
topology information
Topology
terrestrial wireless network topology information
telecommunication network topology
telecommunication network routing
telecommunication network reliability
routing efficiency
Routing
robust information distribution
retransmission reduction
Resiliency
Reliability
acoustic communication
pubcrawl
Protocols
propagation delays
opportunistic flooding approach
network topology
network simulations
Network reconnaissance
network protocols
mine countermeasures
local topology information
Load modeling
energy consumption
degree-of-topology information
contention-based channel access method
Ad-Hoc Network
biblio
Multi End-Hopping Modeling and Optimization Using Cooperative Game
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
MEH
computer network security
Control engineering
cooperative game
cyber-attack
DoS attack
game theory
hosts
information science
malicious scanning
Resiliency
moving target defense
MTD
multi end-hopping
Network reconnaissance
optimisation
optimization method
PCS
possible configurable space
pubcrawl
biblio
Random Projection Data Perturbation Based Privacy Protection in WSNs
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
PPND algorithm
wireless sensor networks
telecommunication security
Sparse projection data perturbation
Sparse matrices
SMART algorithm
security
Resiliency
random projection data perturbation based privacy protection
pubcrawl
privacy protection requirements
privacy preserving
pre-distribution random number
Algorithm design and analysis
node privacy
Network reconnaissance
network coverage area
data traffic
data privacy protection mechanism
data privacy
Data integration
data fusion technology
data fusion algorithm
data fusion
Conferences
biblio
Semantic Information Fusion to Enhance Situational Awareness in Surveillance Scenarios
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
inference mechanisms
Network reconnaissance
National security
military computing
military applications
Markov processes
Markov logic network
logical reasoning
knowledge model
ISR-AA
intelligence-surveillance-and-reconnaissance analytics architecture
information integration
Object oriented modeling
high-level data fusion component
enhanced situational awareness
Databases
Data mining
Data integration
critical events detection
cognition
civil protection
autonomous aerial vehicles
aerospace computing
Resiliency
Unmanned Aircraft Systems
UAS
surveillance scenarios
surveillance
situational picture
situational awareness
sensor fusion
sensor data
semantic information fusion
security forces
video surveillance
reasoning component
pubcrawl
probabilistic reasoning
Probabilistic logic
probabilistic information processing
OOWM
Ontology
ontologies (artificial intelligence)
object-oriented world model
object-oriented methods
biblio
A Graph-Theoretic Approach to Virtual Access Point Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
Correlation
security standpoint
standardization process
telecommunication network management
Resiliency
secure network
security
VAP identification algorithm
virtual access point correlation
wireless LAN
wireless networks
802.11 access point implementation
Communication system security
computer network security
pubcrawl
functional improvement
graph theory
graph-theoretic approach
IEEE 802.11 Standard
individual provider
insecure network
logically separate networks
nascent wireless functionality management
Network reconnaissance
network topology
physical equipment
Probes
biblio
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
IP networks
target services
Servers
Resiliency
Relays
pubcrawl
proxy-based architectures
proxy harvesting attack
Network reconnaissance
moving target defense approach
malicious client isolation
malicious client discovery
attacker reconnaissance effort
high-profile targets
end users
distributed denial of service attacks
DDoS attack mitigation
Conferences
computer network security
Computer crime
Communication networks
client-to-proxy assignment strategy
client shuffling
client remapping
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
Reconnaissance of Industrial Control System by deep packet inspection
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
network protocol
Traffic classification
telecommunication traffic
Resiliency
Reconnaissance
pubcrawl
Protocols
Ports (Computers)
Payloads
network traffic
Network reconnaissance
Communication Network
integrated circuits
Inspection
Industrial Control System (ICS)
industrial control system
industrial control
electronic devices
Deep Packet Inspection (DPI)
deep packet inspection
complex system
biblio
Anonymous port scanning: Performing network reconnaissance through Tor
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Network reconnaissance
Tor
scanning processes
scanning
scan rate
Resiliency
Reconnaissance
pubcrawl
Ports (Computers)
Nmap
Acceleration
Network interfaces
Management information systems
Linux
IP networks
internet
computer communications software
anonymous port scanning
anonymizing port scanning tools
anonymization
biblio
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
ABAC
Access Control
Algorithms
complexity
computer security
graph theory
insider
insider threat
Network reconnaissance
NGAC
NIST
policy machine
pubcrawl
Resiliency
simultaneous instantiation
XACML
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »