Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Network
biblio
Complexity of International Law for Cyber Operations
Submitted by Nazli Choucri on Tue, 03/08/2022 - 7:15pm
Tallinn Manual
Cyber Law
Network
Law of War
biblio
A simulation model of a cloud data center based on traditional networks and Software-defined network
Submitted by aekwall on Tue, 03/08/2022 - 2:41pm
information science
Topology
Mininet
information resources
GNS3
data-center
data
Communications technology
model
named data networking
Data models
data centers
Network
Human behavior
Resiliency
pubcrawl
Analytical models
SDN
Scalability
Bandwidth
biblio
On the Technology of Frequency Hopping Communication Network-Station Selection
Submitted by grigby1 on Tue, 03/01/2022 - 4:25pm
Reconnaissance
Time-frequency Analysis
spread spectrum communication
Separation
Scalability
review
Resiliency
resilience
Research Status
Communication networks
pubcrawl
Network reconnaissance
Network
machine learning
Jamming
Hopping
frequency estimation
frequency
biblio
Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis
Submitted by grigby1 on Tue, 03/01/2022 - 4:19pm
Pipelines
Wires
Vegetation
threat
telecommunication traffic
Table lookup
Scalability
Resiliency
resilience
pubcrawl
Acceleration
network on chip security
Network
Metrics
detection
Decision trees
Decision Tree
Cryptography
composability
biblio
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator
Submitted by grigby1 on Tue, 02/08/2022 - 11:40am
composability
Wormhole
QualNet Simulator
Mobile Ad Hoc
Systems engineering and theory
manet privacy
mobile nodes
Network
Compositionality
pubcrawl
Wireless communication
Computational modeling
privacy
Data models
Conferences
Resiliency
resilience
Metrics
biblio
A Survey on Intrusion Detection System in Ad Hoc Networks Based on Machine Learning
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Industries
MANET Attack Detection
Traffic
Network
intrusion
detection
ANN
telecommunication traffic
WSN
MANET
Compositionality
Logic gates
Resiliency
Metrics
pubcrawl
Wireless communication
SDN
machine learning
Intrusion Detection
wireless sensor networks
Monitoring
biblio
Network Security Evaluation Using Deep Neural Network
Submitted by aekwall on Thu, 09/30/2021 - 11:52am
Resiliency
Neural Network Security
security evaluating
Network
Human Factors
DNN
policy-based governance
Communication networks
cyber-physical systems
security
Metrics
pubcrawl
network security
computer networks
internet
Task Analysis
Neural networks
biblio
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
emergency response networks
Compositionality
Network
emergency management
emergency services
building mobile device trust
building resiliency
communication utility patterns
crowd sensing
Buildings
MACH 2K
MACH-2K trust overlay network architecture
message confidentiality
Mobile handsets
private mobile devices
public service networks
vpn
manet privacy
pubcrawl
architecture
Cryptography
data privacy
Organizations
telecommunication security
History
computer architecture
Resiliency
security
overlay networks
Peer-to-peer computing
Metrics
trust
Ad hoc networks
MANET
mobile ad hoc networks
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
Metrics
Vulnerability
SIEM logs
security of data
Security Metrics
security assessment
security
Risk
pubcrawl
network flow
Network
Attack Circuit
IoT network security
IoT device security
Internet of Things
impact
graph theory
Exploitability
Computing Theory
attack graphs
attack graph
biblio
Accurate Marking Method of Network Attacking Information Based on Big Data Analysis
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
resilience
network attack detection ability
network attack information nodes
network attack nodes
network attacking information
network offensive information
network security defense
open network environment
pubcrawl
Network
Resiliency
Scalability
security of data
smart cities
task scheduling method
telecommunication scheduling
Transportation
big data security in the cloud
accurate marking method
adaptive learning model
attack
attack information chain
attack information tagging
Big Data
Big Data analysis method
Big Data fusion tracking recognition
Chained Attacks
Cloud Computing
computer network security
Conferences
data analysis
information marking
learning (artificial intelligence)
Metrics
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »