Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
router
biblio
NetBot - An Automated Router Hardening Solution for Small to Medium Enterprises
Submitted by aekwall on Mon, 03/14/2022 - 1:42pm
information security
Organizations
machine learning algorithms
network security
pubcrawl
Resiliency
Predictive Metrics
automation
Virtual private networks
Compliance
Hardening
Rollback
router
virtual environments
vulnerability fixing
Router Systems Security
biblio
SCAFFISD: A Scalable Framework for Fine-Grained Identification and Security Detection of Wireless Routers
Submitted by aekwall on Mon, 05/03/2021 - 1:09pm
Prototypes
wireless networks
wireless network
Vulnerability
security
Router Systems Security
router
Resiliency
pubcrawl
Scalable Security
privacy
Predictive Metrics
performance evaluation
Object recognition
Device Identification
Communication system security
access point
biblio
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
Resiliency
telecommunication security
security attacks
Scalability
Routing protocols
Routing attack
router
route disclosure procedure
robotics mobile ad-hoc networks
Robotics MANETs
robotics MANET environment
MANET Attack Detection
removal mechanisms
pubcrawl
mobile ad hoc networks
malicious station attack
Black hole attacks
black hole attack detection mechanisms
BH finding
BH attack
AODV routing protocol
Ad-hoc On-demand Distance Vector
biblio
Efficient Memristor-Based Architecture for Intrusion Detection and High-Speed Packet Classification
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
composability
deep packet inspection
hardware architectures
memristor crossbars
Metrics
network security
packet classification
power grid vulnerability analysis
pubcrawl
range matching
resilience
Resiliency
router
Snort
string matching
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
IoT network monitor
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
router
Mirai Botnet
Monitoring
network data analysis
password
Ports (Computers)
privacy
pubcrawl
Raspberry Pi
Resiliency
IoT network monitor
Scalability
security
Security by Default
security vulnerability
sensitive personal information
telecommunication traffic
user-friendly interface
user interfaces
deep packet analysis
Anomaly Detection
Biomedical monitoring
botnet
botnet traffic detection
character strings
computer network security
connected devices
consumer home IoT networks
Android (operating system)
default device passwords
default passwords
Entropy
home networks
home network security
Internet of Things
invasive software
IoT device
biblio
FlexiWi-Fi Security Manager Using Freescale Embedded System
Submitted by grigby1 on Mon, 03/13/2017 - 12:23pm
network security
wireless LAN
Wireless communication
user traffic
unauthorized user
Trusted Computing
trusted client
telecommunication traffic
telecommunication security
telecommunication network routing
telecommunication network management
system administrator
security
router
pre-shared key
personal model implementation
802.11 standard
infrared module
IEEE 802.11 Standard
freescale embedded system
FlexiWi-Fi security manager
enterprise model
encryption key
embedded systems
Cryptography
Communication system security
client radio
bluetooth module
Bluetooth
authorisation
802.1X
biblio
On Adding Bloom Filters to Longest Prefix Matching Algorithms
Submitted by BrandonB on Wed, 05/06/2015 - 11:52am
Routing
longest prefix matching
Memory management
multihashing
parallel multiple-hashing algorithm
parallel-multiple hashing algorithm
performance evaluation
PMH algorithm
prefix matching algorithms
router
level algorithm
Routing protocols
SRAM
SRAM chips
static random access memory
System-on-a-chip
TCAM technology
ternary content addressable memory technology
wire-speed packet forwarding
Generators
binary search on levels
Bloom filter
Bloom filters
data structures
DRAM
DRAM chips
dynamic random access memory
fast parallel matching
binary search
hardware architectures
Indexes
internet
Internet Protocol
Internet routers
IP address lookup
IP networks
leaf pushing