Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
peer to peer security
biblio
A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs)
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
specific routing roles
flat logical overlay
hierarchical MANETs
hierarchical mobile ad hoc networks
Hierarchical Networks
hierarchical underlay
mobility scenarios
OMNET++
specific performance challenges
dynamic topology changes
Structured Overlay
tactical networks
topology-awareness
underlay mismatch
underlay topology
wireless networks
peer to peer security
telecommunication network topology
Resiliency
pubcrawl
p2p
Peer-to-peer computing
Metrics
telecommunication network routing
MANET
mobile ad hoc networks
telecommunication security
Scalability
Human Factors
mobile devices
DHT
dedicated servers
deployment
deployment solution
biblio
A Monitorable Peer-to-Peer File Sharing Mechanism
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Scalability
peer to peer security
smart contract
peer-to-peer network system
peer-to-peer file sharing mechanism
P2P file sharing system
P2P file sharing network systems
InterPlanetary File System
file deletion
file authentication code
consortium Blockchain
General Data Protection Regulation
IPFS
storage management
Human Factors
security of data
File systems
ethereum
smart contracts
Distributed databases
Data protection
blockchain
Metrics
Peer-to-peer computing
Synchronization
pubcrawl
Resiliency
security
Monitoring
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
Bitcoin Security Reference Model: An Implementation Platform
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
digital wallet
security services
security risk minimization
security functional architecture
Scalability
Resiliency
pubcrawl
peer to peer security
P2P transaction
Metrics
IP protocol
IP networks
Human Factors
application protocol
digital money
decentralized payment system
Cybersecurity
Cryptographic Protocols
cryptocurrency
cryptocurrencies
Bitcoin security reference model
Bitcoin security features
bitcoin security
Bitcoin cyberattacks
bitcoin
biblio
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
malicious services
Scalability
Human Factors
hypermedia
Botnet detection
conversation features
data flow features
DNS query
flow counting
flow similarity
hybrid technique
network traffic
multiple malicious codes
non-P2P traffic filtering mechanism
P2P botnet traffic detection
P2P traffic identification
P2P traffic similarity
peer-to-peer botnets
phishing links
two-stage detection method
two-stage traffic classification method
peer to peer security
feature extraction
Computer crime
computer network security
IP networks
telecommunication traffic
Protocols
invasive software
Classification algorithms
machine learning algorithms
transport protocols
network security
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
pattern classification
machine learning techniques
machine learning classifiers
Anomaly Detection
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
Human Factors
Threat intelligence sharing
threat intelligence
telecommunication traffic
standards
security
Scalability
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnet detection
peer to peer security
P2P botnet detection
network traffic analysis
Metrics
invasive software
botnets
Hidden Markov models
evaluating system
distributed threat intelligence sharing system
distributed methods
distributed cyber threat
distributed botnet
cyberspace security
Cyberspace
computer network security
Clustering algorithms
botnet
BAV quantitative TI model
analytic hierarchy process
AHP and HMM based analysis algorithm
biblio
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
BitTorrent
peer to peer security
resource management
peer-to-peer networks
P2P protocol
network infrastructure
Leecher-to-Leecher transactions
incentive-based security model
incentive security model
incentive methods
Gnutella
fairness
computer network security
Network
Human Factors
Scalability
Metrics
Peer-to-peer computing
Protocols
pubcrawl
Resiliency
computer network management
security
Cryptography
biblio
Blockchain Based Security Framework for P2P Filesharing System
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
P2P filesharing system
Sybil attack
security
Scalability
routing table insertion attack
Routing
Resiliency
resilience
pubcrawl
Protocols
peer-to-peer network
peer-to-peer filesharing system
Peer-to-peer computing
peer to peer security
blockchain
overlay networks
Metrics
Human Factors
human factor
Human behavior
Free riding
file sharing
dynamic self-organized technology
cryptocurrencies
computer network security
collaboration
Blockchain based security framework
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
Human Factors
transaction confirmation process
Software
service attacks
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Peer-to-peer computing
peer to peer security
P2P network
network protocol
network message exchanges
Metrics
bitcoin
human factor
Human behavior
distributed denial of service attacks
denial of service
DDoS Attacks
Data mining
Cryptographic Protocols
cryptocurrencies
computer network security
Computer crime
blockchain
Bitcoin peer-to-peer network
bitcoin mining process
bitcoin message exchanges
bitcoin core software
biblio
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
P2P bots
Spark
security
Scalability
Resiliency
resilience
pubcrawl
Periodicity Behavior Analysis
periodicity behavior
PeerGrep
Peer-to-peer computing
peer-to-peer botnets
peer to peer security
P2P hosts
P2P communications
botnet
P2P botnet
network security
Monitoring
Metrics
IP networks
IP addresses
invasive software
Human Factors
human factor
Human behavior
feature extraction
Conferences
computer network security
Botnet detection
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »