Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
networks
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
file
Privacy-Preserving Network Congestion Control
Submitted by Geir Dullerud on Tue, 01/22/2019 - 7:46pm. Contributors:
Hussein Darir
Hussein Sibai
Chester Cheng
Sayan Mitra
Geir Dullerud
Nikita Borisov
privacy
security
networks
Tor Network
Routing
Posters (Sessions 8 & 11)
1739966
CPS-PI Meeting 2018
2018
Poster
file
A Convex Framework for Control of Systems over Delayed Networks
Submitted by Matthew Peet on Mon, 12/17/2018 - 1:00pm. Contributor:
Matthew Peet
delay
LMI
control
PDE
networks
Session 7: LT
1739990
CPS-PI Meeting 2018
2018
file
Combining Simulation and Emulation Systems for Smart Grid Planning and Evaluation
Submitted by awhitesell on Mon, 10/15/2018 - 2:02pm
computing methodologies
Electrical power system simulation
network design principles
Network Emulation
networks
simulation environments
simulation tools
Smart Grid
software-defined networking
UIUC
UIUC
Automated Synthesis Framework for Network Security and Resilience
biblio
Combining Simulation and Emulation Systems for Smart Grid Planning and Evaluation
Submitted by awhitesell on Mon, 10/15/2018 - 2:02pm
computing methodologies
Electrical power system simulation
network design principles
Network Emulation
networks
simulation environments
simulation tools
Smart Grid
software-defined networking
UIUC
UIUC
UIUC
Automated Synthesis Framework for Network Security and Resilience
biblio
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments
Submitted by grigby1 on Wed, 07/18/2018 - 10:24am
multi-factor
authentication
biometrics
Human behavior
human behaviour
human factor
Human Factors
man-in-the-middle attack
mobile cloud computing
wireless
networks
pubcrawl
security
Sniffing
SSO
Two Factor
two factor authentication
biblio
An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
human beings
Servers
security
SDN
pubcrawl
Observers
networks
IP networks
Human Factors
CAPTCHA
Human behavior
delays
DDoS attack mitigation
DDoS
Computer crime
composability
captchas
biblio
Review of covert channels over HTTP: Communication and countermeasures
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
message content confidentiality
Uniform resource locators
ubiquitous HTTP message
transport protocols
timing
Technological innovation
Servers
Scalability
Resiliency
Receivers
pubcrawl
Protocols
networks
Browsers
internet
HTTP
detection
data leakage
Cryptography
Cryptographic Protocols
covert information container
covert communication method
covert channels
covert channel
Compositionality
capacity
biblio
Privacy-Aware Infrastructure for Managing Personal Data
Submitted by grigby1 on Tue, 09/05/2017 - 1:43pm
composability
Metrics
network accountability
networks
personal data
privacy
pubcrawl
Resiliency
biblio
Digital Footprints and Changing Networks During Online Identity Transitions
Submitted by grigby1 on Tue, 06/27/2017 - 1:04pm
digital artifacts
digital footprints
Human behavior
Identity management
identity transitions
lgbtq
life transitions
Metrics
networks
online identity
pubcrawl
Resiliency
Scalability
social network sites
transgender
« first
‹ previous
1
2
3
4
next ›
last »