Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Router Systems Security
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
SDN
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
Mathematical model
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
Adaptive immune system
layer immune inspired framework
Innate immune system
Immune system
human immune system
dynamic network threats
DoS mitigation
DoS flooding attacks
denial of service attack
data layer
control layer
computer network security
biologically inspired architecture
Biologically Inspired
bio-inspired framework
adaptive layer
biblio
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
IoT firmware kernel greybox fuzzer
vulnerabilities discovery
static binary analysis.
security of data
Router Systems Security
resilience
real-world Linux-based IoT programs
program diagnostics
Metrics
Linux-based IoT program
Linux
IoT program greybox fuzzing
static analysis
Internet of Things
fuzzing
firmware
embedded security
effective vulnerability discovery technique
binary static analysis
Resiliency
composability
Human behavior
pubcrawl
biblio
Modelling, analysis and design of active queue management to mitigate the effect of denial of service attack in wired/wireless network
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Metrics
wireless sensor networks
wireless network
wired network
Time delay
telecommunication congestion control
TCP/AQM system
stochastic systems
stabilizing control syntheses
stability
Router Systems Security
Resiliency
resilience
queue router attacks
pubcrawl
active queue management
Markovian jump linear system
Linear systems
Guaranteed cost approach
feedback control
distributed denial of service attacks
denial of service attack
delays
delay-dependent conditions
DDoS Attacks
Congestion Control
computer network security
closed-loop system
closed loop systems
AQM security
biblio
Mitigating Routing Misbehavior using Blockchain-Based Distributed Reputation Management System for IoT Networks
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Internet of Thing devices
telecommunication network routing
system convergence performance
routing misbehavior mitigation
Router Systems Security
Resiliency
resilience
reputation calculation mechanism
pubcrawl
one-point failure risk
Metrics
malicious misbehaving routers
IoT networks
Internet of Things
Attack detection
inherent decentralized consensus mechanism
Distributed databases
distributed consensus mechanism
distributed blockchain-based RM system
decentralized database
data forwarding services
cryptocurrencies
computer network security
computer network reliability
computer network management
centralized router RM systems
blockchain-based reputation management system
blockchain technique
biblio
Securing Industrial Remote Maintenance Sessions using Software-Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Production
XACML
untrustworthy external networks
software-defined networking
software defined networking
Software
security of data
security
SDN
Router Systems Security
Resiliency
resilience
pubcrawl
production engineering computing
ABAC
network security
Metrics
manufacturing industry
Manufacturing industries
maintenance engineering
internet
industrial remote maintenance session security
industrial remote maintenance
industrial networks
industrial network
considerable economic advantages
Communication networks
Business
biblio
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
pubcrawl
Web server
untrusted networks
untrusted environments
telecommunication control
tailoring onion routing
Servers
secret supply chain procedures
Routing
Router Systems Security
resource-constrained IoT devices
resource-conserving access control
Resiliency
resilience
computer network security
Protocols
protocol incompatibilities
Metrics
IoT device owner
IoT communication
Internet of Things
Internet connectivity
end-to-end security
data privacy
Cryptography
Cryptographic Protocols
cryptographic processing
biblio
An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
network security
time 4 month
telecommunication network routing
signature-based attack analysis tools
Router Systems Security
Resiliency
resilience
pubcrawl
provider edge router honeynet system
Protocols
botnets
network protocol sniffer
Metrics
ISP edge router
IoT-based DDoS attack vectors
internet
honeynet
distributed denial of service attacks
DDoS Attacks
computer network security
biblio
A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Linear systems
zero vulnerability encrypted password
Vulnerability
security
Router Systems Security
router mechanism
Resiliency
resilience
pubcrawl
process control
Metrics
Mathematical model
Aerodynamics
internet
high-level security
encryption
Cryptography
convergence
control systems
computer network security
authorisation
authentication
Approximation error
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
biblio
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
pubcrawl
Intrusion Detection
learning (artificial intelligence)
library call lists
machine learning model
malicious activity
malicious actors
modern energy management systems
performance evaluation
power electronics
PowerWatch
Internet-connected resources
Resiliency
security of data
smart energy management system
Smart Grid
Smart Grid Sensors
Smart Grids
smart power grids
smart-grid
system call tracing
vital information
energy management
bogus sensor data
Compositionality
Computer crime
critical firmware
CSPoweR-Watch
CSPR
cyber-resilient residential power management system
cyber-secure power router
Cyber-security
EMS
Router Systems Security
energy management system (EMS)
energy management systems
energy resources
functional versions
global energy consumption
Hardware
Human Factors
Information analysis
internet
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »