Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SDN
biblio
SDN/NFV-Based DDoS Mitigation via Pushback
Submitted by grigby1 on Tue, 09/07/2021 - 3:23pm
IP networks
Servers
SDN
Resiliency
resilience
pushback
pubcrawl
pattern generation
NFV
Metrics
Aggregates
Human behavior
DDOS attacks detection
DDoS attack mitigation
DDoS
Computer crime
composability
collaboration
Cloud Computing
biblio
Mitigation of Combined DDoS Attack on SDN Controller and Primary Server in Software Defined Networks Using a Priority on Traffic Variation
Submitted by grigby1 on Tue, 09/07/2021 - 3:21pm
Metrics
Topology
standards
spoofed IP address
software defined networking
Servers
SDN
Resiliency
resilience
pubcrawl
composability
IP networks
idle timeout
Human behavior
hard time out
DDOS attacks detection
DDoS attack mitigation
DDoS
control systems
Computer crime
biblio
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
Submitted by grigby1 on Tue, 09/07/2021 - 1:56pm
QoS
Software
security
SDN
Resiliency
resilience
Queueing network model
Queueing analysis
quality of service
Adversarial flow
pubcrawl
process control
Industrial Control Systems
Control Theory
computer architecture
composability
Analytical models
biblio
SDN-based Malware Detection and Mitigation: The Case of ExPetr Ransomware
Submitted by aekwall on Tue, 08/31/2021 - 11:42am
composability
Cryptography
ExPetr ransomware
IP networks
malware detection
Metrics
OpenFlow
POX controller
Protocols
pubcrawl
Ransomware
Resiliency
SDN
Servers
biblio
Global Internet Traffic Routing and Privacy
Submitted by grigby1 on Wed, 08/11/2021 - 4:02pm
internet
ip privacy
BGP Injection
MITM
Virtual private networks
SDN
delays
Routing
composability
IP networks
privacy
Resiliency
resilience
collaboration
policy-based governance
pubcrawl
Peer-to-peer computing
biblio
LSTM-based radiography for anomaly detection in softwarized infrastructures
Submitted by aekwall on Wed, 07/07/2021 - 5:10pm
pubcrawl
visualization
virtualization privacy
Virtualization
Telephone sets
security
SDN
Resiliency
Radiography
5G mobile communication
privacy
orchestration
NFV
Metrics
machine learning
Human behavior
composability
Anomaly Detection
biblio
A Security Model of Ubiquitous Power Internet of Things Based on SDN and DFI
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
security
Human Factors
Internet of Things
Protocols
SDN
Databases
DFI
OpenFlow
power Internet of Things
power systems
Switches
Ubiquitous Computing Security
pubcrawl
Scalability
Metrics
Resiliency
biblio
Adversarial Attacks on AI based Intrusion Detection System for Heterogeneous Wireless Communications Networks
Submitted by aekwall on Thu, 06/24/2021 - 11:50am
IP networks
Scalability
security
Resiliency
Human behavior
pubcrawl
Neural networks
Training
Mathematical model
Intrusion Detection
SDN
Artificial Intelligence
Deep Neural Network
AI security
heterogeneous wireless access technologies
AI Poisoning
biblio
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Protocols
virtual security function
software defined security service
Software
security protocol
security policies
security
SDN
pubcrawl
Network Security Architecture
Predictive models
policy-based governance
NFV
Monitoring
control systems
Cloud Security
Cloud Computing
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
resilience
virtualization servers
virtualization server
virtualization environments
SDN-based security applications
SDN-based IDS
intrusion attacks
HTTP DoS attacks
HTTP DoS
SDN networks
SDN technology
denial-of-service attack
network traffic analysis
IDS
network intrusion detection system
cloud
Cloud Computing
Virtualization
Virtual machining
malicious software
virtualisation
Switches
software defined networking
SDN
Denial of Service attacks
telecommunication traffic
composability
web services
computer network security
Resiliency
pubcrawl
Servers
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »