Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network communication
biblio
liteNDN: QoS-Aware Packet Forwarding and Caching for Named Data Networks
Submitted by aekwall on Mon, 02/22/2021 - 12:36pm
multipath forwarding
computing devices
conventional NDN forwarding
cooperative forwarding strategy
data retrieval latency
data significance
forwarding strategy
Heuristics
liteNDN
caching policy
NDN networks
NDN routers
network utilization
packet forwarding decisions
probability estimation
QoS-aware packet caching
QoS-aware packet forwarding
routing costs
named data networking
telecommunication traffic
Data Security
Resiliency
Human behavior
pubcrawl
internet
telecommunication network routing
quality of service
Scalability
network communication
cache storage
named data networks
in-network caching
data retrieval
cache hit rate
caching normal
biblio
Web APIs in Android through the Lens of Security
Submitted by grigby1 on Wed, 01/20/2021 - 3:19pm
network communication
web communication
Web APIs
Web API URLs
telecommunication security
security of data
security
Resiliency
resilience
public domain software
pubcrawl
open-source apps
network libraries
Android apps
mobile computing
Mobile Apps
JSON data schemas
internet
Compositionality
communication libraries
communication
application programming interface
application program interfaces
APIs
API service providers
API
biblio
Wormhole Attack Detection using Energy Model in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:22am
node energy
dynamic route discovery
dynamic route request
encrypted values
energy level
energy model
high power transmission
intruder nodes
network analysis
dynamic request
NS2 simulator
packet drop ratio
performance curves
static table driven technique
unsecure transmission
wormhole attack detection
MANET Attack Detection
wormhole attacks
pubcrawl
Metrics
resilience
Resiliency
telecommunication network routing
Compositionality
network communication
wormhole attack
Cryptography
AODV
end to end delay
MANETs
mobile ad hoc networks
AODV routing
Apptool
Apptool simulator
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
A Trusted Routing Mechanism for Mobile Social Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
path trust level
trusted path
trusted DSR routing mechanism
Trust Routing
trust level
TDR protocol
social networking (online)
Scalability
Routing protocols
Routing Protocol
route cost
pubcrawl
composability
packet delivery fraction
network topology
network performance
network communication
MSN
mobile social networks
mobile social network
mobile radio
mobile computing
DSR routing protocol
computer network security
biblio
The Hamiltonian of Data Center Network BCCC
Submitted by aekwall on Mon, 08/05/2019 - 9:34am
expandability
topology properties
telecommunication traffic
telecommunication network topology
security
Resiliency
pubcrawl
network traffic
network communication
Hamiltonian path
Hamiltonian
expandable data center network
BCCC network structure
data center networks
data center network structure
Conferences
computing resources
computer centres
composability
cloud computing development
Cloud Computing
Big Data
BCCC structure
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 1:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
biblio
Hash based efficient secure routing for network communication
Submitted by BrandonB on Wed, 05/06/2015 - 7:55am
mobile computing
WLAN
telecommunication security
security
Routing protocols
Routing Protocol
Routing
power backup
packet transfer
networking
network communication
Mobility
Ad hoc networks
Mobile communication
mobile ad-hoc networks
Mobile Ad-hoc
mobile ad hoc networks
infrastructure wireless networks
hash based efficient secure routing
energy problem
Cryptographic Protocols
autonomous network
authentication
attack