Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NFV
biblio
Trusted Virtual Network Function Based on vTPM
Submitted by grigby1 on Mon, 11/08/2021 - 12:45pm
NFV
vTPM
Virtual machining
trusted platform modules
Trusted Platform Module
Trusted Computing
Resiliency
resilience
operating systems
pubcrawl
network function virtualization
Mobile communication
integrity measurement
information science
Hardware
cyber physical systems
cyber physical security
composability
biblio
ARDefense: DDoS Detection and Prevention Using NFV and SDN
Submitted by grigby1 on Wed, 09/08/2021 - 8:33am
attack
composability
DDoS Attack Prevention
Human behavior
Index Terms—DDOS
Metrics
NFV
pubcrawl
resilience
Resiliency
SDN
VM
biblio
SDN/NFV-Based DDoS Mitigation via Pushback
Submitted by grigby1 on Tue, 09/07/2021 - 2:23pm
IP networks
Servers
SDN
Resiliency
resilience
pushback
pubcrawl
pattern generation
NFV
Metrics
Aggregates
Human behavior
DDOS attacks detection
DDoS attack mitigation
DDoS
Computer crime
composability
collaboration
Cloud Computing
biblio
LSTM-based radiography for anomaly detection in softwarized infrastructures
Submitted by aekwall on Wed, 07/07/2021 - 4:10pm
pubcrawl
visualization
virtualization privacy
Virtualization
Telephone sets
security
SDN
Resiliency
Radiography
5G mobile communication
privacy
orchestration
NFV
Metrics
machine learning
Human behavior
composability
Anomaly Detection
biblio
DLT federation for Edge robotics
Submitted by aekwall on Wed, 07/07/2021 - 4:09pm
network function virtualization
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
software defined networking
Robot control
NFV
security
multidomain
MEC
federation
Edge robotics
DLT
distributed ledger
Reliability
privacy
robots
biblio
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Submitted by grigby1 on Thu, 04/29/2021 - 1:15pm
Protocols
virtual security function
software defined security service
Software
security protocol
security policies
security
SDN
pubcrawl
Network Security Architecture
Predictive models
policy-based governance
NFV
Monitoring
control systems
Cloud Security
Cloud Computing
biblio
SUPC: SDN enabled Universal Policy Checking in Cloud Network
Submitted by aekwall on Mon, 10/05/2020 - 10:59am
Protocols
virtualisation
Virtual private networks
SUPC
software defined networking
Software Defined Network (SDN)
Software Defined Network
SF rules
SF rule ordering overlaps
Service Function Chaining (SFC)
service function chain
Security Policy Conflicts
security breaches
SDN enabled universal policy checking
Resiliency
pubcrawl
Security Policies Analysis
policy conflicts
NFV
Network Function Virtualization (NFV)
network function virtualization
multitenant cloud networks
monitoring service functions
Middleboxes
Metrics
Firewalls (computing)
dynamic SFC composition
Dynamic Networks and Security
conflict checking mechanism
computer network security
composability
Cloud Computing
biblio
Enhancing the Reliability of NFV with Heterogeneous Backup
Submitted by aekwall on Mon, 07/27/2020 - 11:14am
NFV
VNF executor
virtual network function
Service Chain
scalable end-to-end service chaining
NFV SFC
heterogeneous backup strategy
Heterogeneous
flexible end-to-end service chaining
data center environments
Backup
back-up procedures
intrusion tolerance
network function virtualization
Switches
security of data
computer centres
Virtualization
Games
Load modeling
game theory analysis
Reliability
composability
pubcrawl
Resiliency
game theory
Software
security
virtualisation
Cloud Computing
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
NFV
VSNs
virtualisation
virtual shadow networks
telecommunication network topology
software defined networking technologies
software defined networking
Servers
SDN
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
overlay networks
centralized management
network topology
Network reconnaissance
network function virtualization
MTD
moving target defense
mirrors
link-map
ISP
Internet Service Provider networks
internet
flooding reconnaissance attacks
DDoS Attacks
computer network security
Computer crime
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
1
2
3
next ›
last »