Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network devices
biblio
NDNconf: Network Management Framework for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 12:35pm
electronic data interchange
unified configuration
structured naming
stateful data retrieval
standard Interest-Data exchanges
secured NDN data
networking architectures
network management framework
network devices
NDNconf framework
native data-centric NDN mechanisms
name-based interest forwarding
data-centric security model
configuration data models
application layers
in-network caching
computer network security
network components
named data networking
complex networks
internet
standards
pubcrawl
Human behavior
Resiliency
Data models
computer network management
Protocols
security
Servers
Scalability
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 11:42am
SDN infrastructure
Network Security Architecture
networking arena
Performance analysis
policy-based approach
Policy-based Security Architecture
pubcrawl
resilience
SDN based enterprise networks
network devices
SDN security
secure SDN
security attacks
security measures
security policies
software defined networking
telecommunication security
Dynamical Systems
network attacks
Metrics
Enterprise Network Security
dynamic policy framework
dynamic policy enhanced integrated security architecture
dynamic networks
dynamic changes
different security mechanisms
computer network security
computer network management
business communication
authorisation
composability
Predictive Metrics
Resiliency
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Software-defined networking (SDN)
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
ongoing attacks
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
Internet connectivity
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Anomaly Detection
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
biblio
Research on modeling for network security policy confliction based on network topology
Submitted by grigby1 on Mon, 04/30/2018 - 2:26pm
network topology
telecommunication security
telecommunication network topology
security policy model
security policies
security
Routing
pubcrawl
Protocols
Policy consistency
Peer-to-peer computing
campus network
network security policy confliction
network security field
network modeling
network devices
IP networks
graph theory
distributed network system
Conflict checking
Communication networks
biblio
Maximizing the Throughput of Hash Tables in Network Devices with Combined SRAM/DRAM Memory
Submitted by BrandonB on Wed, 05/06/2015 - 11:01am
Maximum matching
Throughput
system-on-chip
SRAM chips
random bipartite graph
Random access memory
performance evaluation
network devices
multiple-choice hash tables
memory speed difference
Memory management
average lookup time
Internet backbone traces
internet
hash table throughput maximization
graph theory
fixed left-side vertex degree
DRAM chips
data structures
combined SRAM/DRAM memory model
combined SRAM-DRAM memory
Bipartite graph
biblio
Flow-based conflict detection in OpenFlow networks using first-order logic
Submitted by BrandonB on Tue, 05/05/2015 - 8:50am
Internet architecture
unreachable flows
transport protocols
Proposals
OpenFlow network architecture
OpenFlow controller
network elements
network devices
Media Access Protocol
management plane
knowledge based systems
IP networks
centralization architecture
inference mechanisms
inference engine
Indexes
flow-based conflict detection
first-order logic
control systems
control plane
computer network management
Clean Slate initiative
centralized controller