Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SDN
biblio
An Improved Method of DDoS Attack Detection for Controller of SDN
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
Attack detection
DDoS attack detection
real-time DDoS detection attack method
openflow switch
DDoS attack traffic detection
DDoS attack feature
controller overhead
BiLSTM-RNN neural network algorithm
BiLSTM-RNN
SDN environment
distributed denial of service attacks
telecommunication control
Software Defined Network
computer network security
recurrent neural nets
SDN controller
SDN
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
telecommunication traffic
DDoS
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 12:01pm
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
NFV
VSNs
virtualisation
virtual shadow networks
telecommunication network topology
software defined networking technologies
software defined networking
Servers
SDN
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
overlay networks
centralized management
network topology
Network reconnaissance
network function virtualization
MTD
moving target defense
mirrors
link-map
ISP
Internet Service Provider networks
internet
flooding reconnaissance attacks
DDoS Attacks
computer network security
Computer crime
biblio
A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 11:21am
moving target defense
software-defined networking
software defined networking
Software Defined Network
security response measures
security of data
SDN
Resiliency
real-time systems
Real-time intrusion detection
pubcrawl
protection requirement analysis
Predictive Metrics
Networked Control Systems Security
closed-loop security control
IP networks
Intrusion Detection
Industrial Control Systems
industrial control system
industrial control
Anomaly Detection
ICs
dynamic cybersecurity protection method
cybersecurity protection
control systems
control engineering computing
computer security
composability
biblio
SDN Enabled Secure IoT Architecture
Submitted by aekwall on Mon, 05/04/2020 - 11:15am
resource-constrained devices
Software Defined Network (SDN) Security
Precision agriculture
Policy based Secure IoT Architecture
lightweight protocol
IoT network infrastructure security
IoT Authentication and Access Control
Internet of Things (IoT) Security
integrated security approach
authenticated malicious IoT devices
Network Security Architecture
cyber systems
critical national infrastructure
computer network security
Software Defined Networks
Logic gates
control systems
SDN
authentication
pubcrawl
Resiliency
software defined networking
computer architecture
Protocols
Cryptographic Protocols
Internet of Things
biblio
White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data Plane
Submitted by grigby1 on Fri, 04/17/2020 - 10:58am
Protocols
White Box Security
white box analysis
virtualisation
Virtual Switches
Virtual Switch
virtual SDN data plane
static code analysis techniques
software switch functionalities
software defined networking
security
SDN
Resiliency
resilience
pubcrawl
Cloud Computing
programmable virtual switches
OpenFlow communication protocol
Metrics
low rate saturation attacks
low rate saturation attack
legacy network protocols
effective low profile attacks
dynamic code analysis techniques
computer network security
computer centres
Compositionality
composability
cloud data center
biblio
Research on Digital Forensics Framework for Malicious Behavior in Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
SDN
malicious virtual machine detection
Memory Analysis
Metrics
privacy
privacy leakage
pubcrawl
resilience
Resiliency
malicious behavior oriented framework
traceability module
virtual machines
Virtual machining
virtualisation
virtualization facility memory evidence extraction
virtualization privacy
volatile data loss problems
full-traffic flow detection technology
cloud-based malicious behavior detection mechanism
composability
Computer crime
cyber crime
cybercrimes
Digital Forensics
digital forensics framework
emergency services
Cloud Computing
Human behavior
Human Factors
IaaS service based forensics module
infection topology
information forensics
law enforcement
malicious behavior
biblio
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
Submitted by aekwall on Mon, 04/13/2020 - 10:14am
ROS
SIEM
security event management system
SDN-based security policy enforcement
ROSDefender
ROS-Defender
robotics systems
robotics
Robotic system
OpenvSwitch
IPS
dynamic policy enforcement points
anomaly detection systems
intrusion prevention system
robotic applications
computer network security
robots
Robot sensing systems
security policies
SDN
Peer-to-peer computing
policy-based governance
pubcrawl
software defined networking
Linux
security
Access Control
Servers
firewall
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »