Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
real-time systems
biblio
DDoS Attack Mitigation in Internet of Things Using Software Defined Networking
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Monitoring
telecommunication traffic
Switches
software defined networking
Software
SDN
sampling-based anomaly detection
Routing
Resiliency
real-time systems
pubcrawl
OpenFlow
network security
ADS
Metrics
IoT systems
Internet of Things
Human behavior
DDoS attack mitigation
DDoS Attack
core networks
computer network security
Computer crime
composability
anomaly detection systems
anomaly detection algorithm
biblio
Machine learning aided traffic tolerance to improve resilience for software defined networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
SDN
OpenFlow
pattern classification
POX controller platform
Prediction algorithms
pubcrawl
real-time systems
ReSDN
resilience
resilience framework
Resiliency
routing table
network security
SDNs
software defined networking
Software Defined Networks
Survivability
SYN flood
telecommunication network routing
telecommunication traffic
Traffic Management
traffic tolerance
Training
feature extraction
centralised control
centralised controller
composability
computer network management
computer network reliability
computer network security
Decision Making
DoS attack
DoS attacks
Engines
attacks classification
flexible management
Future Internet
intrusion tolerance
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious intrusion detection
Mininet simulator
MIT KDD 1999 dataset
neptune attack
biblio
Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
hybrid cryptosystem
video signal processing
video encryption
Symmetric Key Cryptography
Streaming media
Security analysis
Resiliency
real-time systems
pubcrawl
Multimedia systems
multimedia data
multimedia content
Metrics
hybrid video cryptosystem
hybrid encryption system
advanced encryption standard
high initial-value sensitivity
Hardware performance analysis
Hardware
encryption
CTR mode
Cryptography
composability
chaotic cryptography
chaos generators
chaos generator
Block Cipher
Algorithm design and analysis
AES
biblio
Security in software-defined wireless sensor networks: Threats, challenges and potential solutions
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
control systems
sensor security
WSN
water resources
tools
software-defined wireless sensor network
software-defined networking approach
security threats
SDWSN security
SDWSN
SDN paradigms
SD-WSN
real-time systems
Internet of Things paradigm
IoT
authorization
wireless sensor networks
computer network security
composability
SDN
Human Factors
software defined networking
Human behavior
Resiliency
pubcrawl
security
Metrics
biblio
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
Waveform Analysis and Synthesis
security
Resiliency
Receivers
real-time systems
pubcrawl
Production
Memory management
Adaptive Programming
Hard Real-Time Systems
grammatical inference
Grammar
Expectation-Driven Receiver
Evolutionary Programming
drones
computer security
Case-Based Reasoning
biblio
Real-Time IRC Threat Detection Framework
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Metrics
WannaCry ransomware attack
tools
Stanford coreNLP
social networking (online)
social media platforms
security of data
Scalability
Resiliency
real-time threat detection
real-time text communications
real-time systems
real-time IRC threat detection framework
pubcrawl
Neural networks
Monitoring
Autonomic Security
malicious IRC behavior analysis
IRC protocol
IRC channel monitoring
Internet Relay Chat protocol
Internet Relay Chat (IRC)
internet
hacker data analysis and visualization
hacker community
electronic messaging
Data collection
cyber security
Computer hacking
Computer crime
autonomic threat detection
biblio
Artificial neural network based static security assessment module using PMU measurements for smart grid application
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
smart grid system
policy-based governance
power engineering computing
power system security
pubcrawl
real-time systems
Resiliency
security
smart grid application
Policy
smart power grids
standard IEEE 30 bus system
static security assessment scheme
Training
voltage magnitude
Voltage measurement
zero injection buses
inter connected power system
artificial neural network based static security assessment module
Artificial Neural Networks
collaboration
genetic algorithm
genetic algorithms
Governance
Government
IEEE standards
artificial neural network
neural nets
Neurons
optimization model
phasor measurement
Phasor Measurement Unit
Phasor measurement units
PMU measurements
biblio
Active surveillance using depth sensing technology \#8212; Part I: Intrusion detection
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
outdoor intrusion activities
wall climbing detection
video surveillance
Streaming media
skeletal trespassing detection
skeletal position monitoring
sensors
safety systems
Resiliency
real-time systems
pubcrawl
premise intrusion
active surveillance
object detection
Microsoft Kinect sensor
Metrics
loitering detection
Intrusion Detection
image sensors
Human Factors
Human behavior
depth sensing technology
computer architecture
biblio
Two-way real time multimedia stream authentication using physical unclonable functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:04pm
Multimedia Signal Processing
Xilinx
video surveillance
telecommunication security
Streaming media
signal processing
Resiliency
Receivers
real-time systems
pubcrawl
physical unclonable functions
multimedia stream authentication
authentication
Multimedia communication
Metrics
media streaming
license/key management
Human Factors
Human behavior
hardware-based security
Hardware
FPGA
Digital rights management
biblio
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
pubcrawl
vTPM DTE
virtual Trusted Platform Module (vTPM)
virtual trusted platform module
virtual TPM dynamic trust extension
virtual machines
trusted platform modules
Trusted Platform Module (TPM)
Trusted Computing
Trust Extension
time token
Servers
Resiliency
real-time systems
public key cryptography
attestation data
pTPM
physical TPM
performance measurements
IK certificate
identity key certificate
Heuristic algorithms
frequent migrations
Elliptic curve cryptography
Computers
composability
authorisation
authentication server
authentication
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
next ›
last »