Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP address
biblio
DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centers
Submitted by grigby1 on Thu, 05/12/2022 - 9:48am
network operations
Web and internet services
Virtual machining
virtual machine security
Virtual machine monitors
virtual machine
TCPIP
service-oriented architecture
Resiliency
resilience
pubcrawl
Named Data Network Security
network interface
IP networks
IP address
domain name system
DNS records
cyber physical systems
Cryptography
composability
Cloud Computing
biblio
FastMove: Fast IP Switching Moving Target Defense to Mitigate DDOS Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 11:35am
denial-of-service attack
Switches
Servers
Resiliency
resilience
pubcrawl
moving target defense
Metrics
IP networks
IP address
Zero day attacks
DDoS
Computer crime
computer architecture
composability
Complexity theory
Cloud Computing
Bot
attack
defense
biblio
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
data visualisation
word embedding
unsupervised clustering
persistent attacks detection
IP2Vec
IP address
Graph Models
feature embeddings
event feature embeddings
community detection
alert graphs
advanced persistent threats
security analysts
coordinated attacks
security of data
graph model
IDS
APT
advanced persistent threat
network security
Scalability
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Intrusion Detection Systems
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 10:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Overview on Moving Target Network Defense
Submitted by aekwall on Mon, 09/09/2019 - 9:47am
Scalability
Predictive Metrics
Space exploration
route mutation
research hotspot
port mutation
numerous related works
multiple mutation
MTND
MTD
moving target network defense
IP address and port mutation
IP address
fingerprint mutation
security of data
network level
Fingerprint recognition
Communication networks
internet
Synchronization
pubcrawl
Resiliency
network security
moving target defense
security
IP networks
computer network security
biblio
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 10:39am
NAT overflow attack
IPv6 middlebox
ipv6 security
Logic gates
Metrics
Middlebox
middlebox security problems
Middleboxes
Mobile handsets
NAT bricking attack
IPv6 cellular networks
NAT resources
NAT wiping attack
over-billing attacks
pubcrawl
Resiliency
security
stateful NAT64 boxes
TCP sequence number verification
telecommunication services
denial-of-service attacks
backward compatibility
cellular devices
cellular middleboxes
cellular network
Cellular networks
cellular operators
cellular radio
collaboration
composability
active NAT mappings
firewalls
IP address
IP networks
IP-based blacklisting
IPv4 address
IPv4 services
IPv6
IPv6 address
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 9:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
biblio
On the performance of the LISP beta network
Submitted by BrandonB on Tue, 05/05/2015 - 8:50am
internetworking
USA site
Routing protocols
Routing
median mapping resolution delay
locator-identifier separation protocol
LISP interworking infrastructure
LISP Beta Network reliable performance
IP networks
IP address
interworking mechanism
BGP churn reduction
internet
European infrastructure
Europe
delays
Databases
control plane
computer network reliability
BGP table size reduction
BGP routing policy
1
2
next ›
last »