Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Router Systems Security
biblio
Betweenness Centrality and Cache Privacy in Information-Centric Networks
Submitted by grigby1 on Mon, 11/04/2019 - 12:40pm
anonymity
anonymity set
betweenness centrality
cache privacy
caching
ICN
information-centric networking
Metrics
Named-Data Networking
NDN
pubcrawl
resilience
Resiliency
Router Systems Security
timing attacks
biblio
A Reactive Defense Against Bandwidth Attacks Using Learning Automata
Submitted by grigby1 on Mon, 11/04/2019 - 12:40pm
Bandwidth Attacks
Distributed Denial of Service (DDoS)
Distributed Packet Filtering
IP Traceback
learning automata
Metrics
pubcrawl
resilience
Resiliency
Router Systems Security
biblio
Towards In-Network Security for Smart Homes
Submitted by grigby1 on Mon, 11/04/2019 - 12:40pm
Anomaly Detection
attack mitigation
Internet of Things
Metrics
network security
pubcrawl
resilience
Resiliency
Router Systems Security
Smart homes
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
Secure and Efficient Approach to Prevent Ad Hoc Network Attacks Using Intrusion Detection System
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
mobile computing
Wireless communication
Ubuntu OS
telecommunication network topology
self-organizing
self-maintenance
security of data
security
secure mechanism
Router Systems Security
Resiliency
resilience
pubcrawl
NS 2.35 software
Ad hoc network attacks
mobile ad hoc networks
Metrics
MAES
Linux
intrusion detection system
Intrusion Detection
hybrid system
Elliptic curve cryptography
ECC
dynamic topology features
Conferences
Ad hoc networks
biblio
Location Determination by Processing Signal Strength of Wi-Fi Routers in the Indoor Environment with Linear Discriminant Classifier
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
Metrics
wireless LAN
Wireless fidelity
Wi-Fi signal values
Wi-Fi signal strength
Wi-Fi routers
Topology
statistical analysis
signal classification
Router Systems Security
Resiliency
resilience
pubcrawl
classification
Mathematical model
machine learning algorithms
location determination
linear discriminant analysis classification
Linear discriminant analysis
indoor radio
indoor location determination
Global Positioning System signals
Global Positioning System
Fingerprint recognition
Classification algorithms
biblio
Anomalies Detection of Routers Based on Multiple Information Learning
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
privacy
telecommunication network routing
Syslogs
security of data
security
routers
Router Systems Security
router system
router syslogs
router security
router anomalies detection
Resiliency
resilience
pubcrawl
Anomaly Detection
multiple information learning
Metrics
learning (artificial intelligence)
learning
internet
input routers
feature extraction
Diagnostics
Correlation
computer network security
Computer bugs
communication devices
biblio
Weakness Identification and Flow Analysis Based on Tor Network
Submitted by aekwall on Mon, 08/26/2019 - 10:08am
Router Systems Security
darknet
Human behavior
Metrics
network traffic analysis
policy-based governance
pubcrawl
resilience
security weaknesses
SVM
The Onion Router
biblio
Attribute Based Content Security and Caching in Information Centric IoT
Submitted by aekwall on Mon, 08/05/2019 - 10:45am
Router Systems Security
Ciphertext policy attribute-based encryption
Information Centric Networks
information-centric networks
IoT
pubcrawl
Resiliency
Scalability
secure communications
biblio
Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers
Submitted by aekwall on Wed, 05/01/2019 - 12:43pm
Router Systems Security
automated
composability
embedded systems
IoT firmware
large scale
Metrics
pubcrawl
Resiliency
vulnerability detection
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »