Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet traffic
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
deep packet inspection approaches
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
Software-Defined Networks
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
pubcrawl
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Inspection
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
An efficient KP-ABE scheme for content protection in Information-Centric Networking
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
KP-ABE
fast key generation
FKP-ABE
ICN
indeterminate caches
information-centric networking
internet
Internet traffic
key policy attribute based encryption
fast key decryption
KP-ABE schemes
policy-based governance
pubcrawl
Scalability
self-contained protection
Streaming media
telecommunication traffic
Access Control
fast decryption
encryption
efficient KP-ABE scheme
efficient key-policy ABE
Data Security
Data protection
Cryptography
content protection
computer network security
computer architecture
collaboration
cached contents
cache storage
attribute-based encryption
attribute based encryption
biblio
Poster: rQUIC - integrating FEC with QUIC for robust wireless communications
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
secure transport protocol
pubcrawl
QUIC
quick UDP Internet connections
radio networks
resilience
Resiliency
robust wireless communications
rQUIC
Propagation losses
security standards
Servers
standards
telecommunication traffic
transport layer
transport protocols
Wireless communication
composability
multiplexed transport protocol
Metrics
Internet traffic
internet
HTTP based applications
forward error correction
FEC
experimental transport protocol
European Tier1-ISP
Error analysis
delays
default end-to-end encryption
Cryptography
connection establishment reduction
computer network security
biblio
Path Planning of Submarine Cables
Submitted by aekwall on Mon, 03/02/2020 - 12:37pm
Earth
Underwater Networks
Underwater cables
telecommunication network planning
submarine optical-fiber cables
submarine optical fiber cables
submarine cables
seismic resilience
optical cables
long-haul cable path design
Internet traffic
Internet data
FMM
fast marching method
Earthquakes
Scalability
Dijkstra's algorithm
cost effectiveness
Cable shielding
cable risk factors
cable costs
Path Planning
optical fibre networks
maintenance engineering
internet
optimization
Metrics
pubcrawl
Resiliency
telecommunication traffic
biblio
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
law enforcement
telecommunication traffic
telecommunication network routing
streaming design
source anonymity
Secure Processing
Scalability
Resiliency
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
Metrics
Light-weight
anonymous data sharing
Internet traffic
internet
Information Leakage
encryption
encrypted search capabilities
Elliptic curve cryptography
destination anonymity
data sharing
computer network security
circuit creation
Ciphers
anonymous routing
biblio
Characterizing Roles and Spatio-Temporal Relations of C&C Servers in Large-Scale Networks
Submitted by grigby1 on Fri, 05/19/2017 - 1:55pm
botnet
botnets
C&C server
Human behavior
Internet traffic
pubcrawl
traffic monitoring
biblio
"SRSC: SDN-based routing scheme for CCN"
Submitted by grigby1 on Tue, 02/21/2017 - 12:04pm
Protocols
Topology
telecommunication network routing
SRSC
software-defined networking
software defined networking
SDN-based routing scheme
scalable routing scheme
Routing
pubcrawl170103
CCN
process control
Peer-to-peer computing
NS-3 simulator
network topology
IP networks
Internet traffic
internet
content centric network
clean-slate approach
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences