Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
TCPIP
biblio
DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centers
Submitted by grigby1 on Thu, 05/12/2022 - 10:48am
network operations
Web and internet services
Virtual machining
virtual machine security
Virtual machine monitors
virtual machine
TCPIP
service-oriented architecture
Resiliency
resilience
pubcrawl
Named Data Network Security
network interface
IP networks
IP address
domain name system
DNS records
cyber physical systems
Cryptography
composability
Cloud Computing
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
log management
whitelist-based security protection
whitelist management
trusted computing technology
Trusted Computing
transport protocols
TCPIP
TCP/IP protocol
security policy management
security management system
security management
Resiliency
resilience
Qt graphical management interface
pubcrawl
Metrics
composability
Kernel
IoT devices
Internet of Things development
Internet of Things
graphical management interface
embedded systems
embedded system security protection
embedded security protection system
Cryptography
cryptographic algorithm
Computers
computer network security
computer network reliability
computer network performance evaluation
computer network management
biblio
ConForm: In-band Control Plane Formation Protocol to SDN-Based Networks
Submitted by grigby1 on Tue, 03/16/2021 - 2:10pm
SDN-based networks
OpenFlow-based SDN networks
optical switches
policy-based approach
protocol design
Protocols
pubcrawl
resilience
Resiliency
network topology discovery
security
Self-establishment
software defined networking
TCPIP
telecommunication network topology
telecommunication traffic
Topology
transport protocols
In-Band Control Plane
bootstrap protocol
clean slate
clean slate architectures
collaboration
computer network management
data plane
Formal Specification
Human behavior
Bootstrap
In-band Control Plane Formation Protocol
inband control plane
IP networks
management plane activities
management plane related activities
Metrics
network startup
network topology
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
evolutionary design approach
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
TCPIP
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
Bandwidth
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
programming
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
biblio
Graph-Based Event Classification in Grid Security Gateways
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
renewable distributed energy resource aggregators
Grid Security
grid security gateways
Grid Trust
network anomaly detection
network security
packet header behavioral analysis
power distribution control
power distribution control devices
encrypted communications
renewable energy sources
SG system
Substations
TCP-IP packet
TCPIP
time-series data
Trusted Communications
Control Theory
transport protocols
security
Protocols
power engineering computing
power system security
telecommunication security
probability
pubcrawl
encryption
Cryptography
Anomaly Detection
graph theory
power grids
Cyber-physical attacks
DERA
distributed power generation
electrical grid distribution network
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
machine learning methods
window sizes
Vectors
timing
telecommunication channels
TCPIP
Scalability
Resiliency
resilience
pubcrawl
Protocols
network steganography
composability
machine learning
Linux
learning (artificial intelligence)
information security
hidden data
feature extraction
data packets
covert timing channel
covert channels
computer network security
Compositionality
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
TCP/IP and ICN Networking Technologies for the Internet of Things: A Comparative Study
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
caching
TCPIP
TCP/IP stack
TCP/IP
packet level security
naming
IP-based technologies
IoT requirements
IoT environments
interconnecting resource-constrained devices
information-centric networks
information-centric networking paradigm
ICN networking technologies
communication paradigms
computer network security
Low-Power and Lossy Networks
6LoWPAN
Routing protocols
internet
composability
pubcrawl
Resiliency
transport protocols
computer architecture
IoT applications
security
Internet of Things
IP networks
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
resilience
IP networks
low interaction honeypots
low- interaction honeypot
low-interaction honeypot
operating systems
performance evaluation
Probes
pubcrawl
internet
Resiliency
Scalability
security
TCPIP
telecommunication security
tools
Windows - KFSensor
attack actions
inhibiting fingerprinting attacks
Human Factors
Human behavior
honey pots
fuzzy technique
fuzzy set theory
fingerprinting techniques
fingerprinting detection mechanism
fingerprinting attack tools
Fingerprint recognition
fingerprint low-interaction honeypots
data privacy
computer network security
completeness attack vectors
authorisation
« first
‹ previous
1
2
3
next ›
last »