Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SDN
biblio
Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)
Submitted by aekwall on Mon, 04/13/2020 - 10:07am
Local area networks
Security by Default
Software Defined Perimeter
SD-WAN
SD-Node
machine-to-machine communications
machine-to-machine communication
M2M devices
industrial Internet of Things for Critical Infrastructure
industrial application
IIoT-CI
wide area networks
Software Defined Networks
computer network security
SDN
risk management
pubcrawl
Resiliency
critical infrastructure
software defined networking
Software
Protocols
security
Internet of Things
Scalability
ddos mitigation
biblio
Zero-Day Attack Detection and Prevention in Software-Defined Networks
Submitted by grigby1 on Fri, 03/27/2020 - 11:38am
Zero day attacks
defense
collaboration
composability
controller
Intrusion Detection System (IDS)
Mininet
policy-based governance
pubcrawl
sandbox
sandboxing
SDN
Switch
zero-day attack
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
SDN
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
Mathematical model
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
Adaptive immune system
layer immune inspired framework
Innate immune system
Immune system
human immune system
dynamic network threats
DoS mitigation
DoS flooding attacks
denial of service attack
data layer
control layer
computer network security
biologically inspired architecture
Biologically Inspired
bio-inspired framework
adaptive layer
biblio
Securing Industrial Remote Maintenance Sessions using Software-Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Production
XACML
untrustworthy external networks
software-defined networking
software defined networking
Software
security of data
security
SDN
Router Systems Security
Resiliency
resilience
pubcrawl
production engineering computing
ABAC
network security
Metrics
manufacturing industry
Manufacturing industries
maintenance engineering
internet
industrial remote maintenance session security
industrial remote maintenance
industrial networks
industrial network
considerable economic advantages
Communication networks
Business
biblio
An efficient modular security plane AM-SecP for hybrid distributed SDN
Submitted by grigby1 on Wed, 03/18/2020 - 11:58am
SDN layers which ease packets inspections
Internet service providers
invasive software
malwares
mobile operators
pubcrawl
resilience
Resiliency
Scalability
SDN
internet
SDN security
SDN's security issues
SDNs
security
security of data
Servers
software defined networking
technical challenges
telecommunication traffic
detecting intrusions
centralized network architecture
centralized security layer
computer architecture
Computer crime
computer network security
Conferences
control planes
data plane
denying services
AM-SecP
distributed systems
DoS/DDoS
efficient modular security plane AM-SecP
end user layer
Firewalls (computing)
flexibility
Forensics
hybrid distributed SDN
biblio
Risk Assessment Approach to Secure Northbound Interface of SDN Networks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
risk assessment
traffic demand requests
telecommunication traffic
software defined networking
Security Risk Estimation
security
secure Northbound interface
SDN network administrators
SDN
Scalability
risk management
risk assessment approach
accurate risk estimation
Resiliency
RAMSES
pubcrawl
Northbound-API
network optimization tool
network cost
Metrics
Human Factors
computer network security
computer network management
application program interfaces
biblio
Mitigation of DDoS Attacks in Software Defined Networks at Application Level
Submitted by grigby1 on Wed, 02/26/2020 - 4:45pm
composability
controller
DDoS attack mitigation
DDoS Attacks
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
SDN
threat mitigation
biblio
A Robust TCP-SYN Flood Mitigation Scheme Using Machine Learning Based on SDN
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
security
pubcrawl
resilience
Resiliency
resource overload
robust TCP-SYN flood mitigation scheme
SDN
SDN controller
SDN networks
networking technology
security device
Software Define Networking
software defined networking
system stop
TCP-SYN flood attack mitigation
TCP-SYN Flood Mitigation
threat mitigation
centralized management
network operators
mitigation methods
Metrics
machine learning
learning (artificial intelligence)
KNN
Internet users
internet
Human Factors
Human behavior
flexible processing
DDoS
computer network security
computer network management
complex security algorithms
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
network topology
WEKA
threat vectors
Support vector machines
support vector machine
software defined networking
security threat protection
SDN network
SDN
random forests
Random Forest
pubcrawl
privacy
Computer crime
nearest neighbour methods
Metrics
Measurement
machine learning
k-nearest neighbors
J48
Floods
distributed denial-of-service attack
DDoS attack detection
DDoS
control systems
computer network security
biblio
Optimal Cache Placement and Migration for Improving the Performance of Virtualized SAND
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
software controlled virtualized DASH environments
resilience
Resiliency
SAND
SAND architecture
Scalability
SDN
SDN controller
Servers
Software
software controlled virtualized approaches
quality of experience
standards
Streaming media
video streaming
virtualisation
virtualized caches
virtualized DANEs
virtualized SAND deployments
Web Caching
web-caches
end-users
adaptive video techniques
Bandwidth
cache location algorithm
cache migration algorithm
cache storage
DANE
DASH
DASH Aware Network Elements
dominant Internet applications
pubcrawl
good foundation
high QoE
HTTP
hypermedia
internet
Metrics
MPEG standard
optimal cache placement
optimal locations
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »