Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SDN controllers
biblio
POX Controller Evaluation Based On Tree Topology For Data Centers
Submitted by grigby1 on Fri, 03/31/2023 - 10:20am
storage management
tree topology
SDN controllers
Performance Metrics.
Mininet Emulator
data center network
Resiliency
Software Defined Network
data centers
pubcrawl
big data security metrics
data analysis
Measurement
network topology
Industries
Scalability
Throughput
resilience
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
hierarchical attack graph
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
complex network
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
composability
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
computer network security
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 11:01am
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
biblio
An SDN/NFV-Enabled Architecture for Detecting Personally Identifiable Information Leaks on Network Traffic
Submitted by grigby1 on Fri, 04/17/2020 - 9:24am
SDN/NFV-enabled architecture
NFV-enabled system
personally identifiable information detector
personally identifiable information leaks detection
privacy
privacy leaks
pubcrawl
resilience
Resiliency
SDN controllers
NFV MANO
Servers
social networking
software defined networking
software defined networking paradigm
software-based solutions
traffic intensity
unintended data disclosure
virtualisation
virtualization privacy
Human Factors
composability
computer architecture
computer network security
Data Breach
data breaches
data privacy
data-intensive nature
hardware-specific implementation
Human behavior
Cloud Computing
internet
leak detection
leak detection systems
load balancer
Measurement
Metrics
Middleboxes
network function virtualization
network traffic
biblio
Q-DATA: Enhanced Traffic Flow Monitoring in Software-Defined Networks applying Q-learning
Submitted by aekwall on Mon, 04/13/2020 - 9:07am
SDN controllers
forwarding performance status
Network Statistics and Software-Defined Networking
optimal traffic flow matching policy
policy formulation
proactive forwarding device protection
Q-DATA framework
Q-learning algorithm
Reinforcement learning
reinforcement learning approach
REST SDN application
SDN based networks
Degradation
SDN environment
SDN switches
SDN-based traffic flow
SDN-based traffic flow matching control system
support vector machine based algorithm
traffic flow granularity
traffic flow information
traffic flow monitoring
traffic forwarding performance degradation protection
Security by Default
control systems
Monitoring
Scalability
telecommunication traffic
computer network management
software defined networking
Support vector machines
learning (artificial intelligence)
Resiliency
pubcrawl
software-defined networking
computer network security
Security analysis
Software-Defined Networks
computer network reliability
data plane
centralised control
centralized network control
centralized network management
control framework
control plane
Control System
biblio
Security Evaluation Methodology for Software Defined Network Solutions
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
SDN architecture
software-defined networking
software defined networking
software defined network solutions
security-related features
security evaluation methodology
Security Evaluation
security controls
security assessment
SDN solutions
SDN security
SDN controllers
SDN choice
authentication
Scalability
Resiliency
resilience
pubcrawl
Organizations
Object recognition
NIST 800-53
Cryptography
control systems
computer networking
computer network security
comprehensive methodology
biblio
AIM-SDN: Attacking Information Mismanagement in SDN-Datastores
Submitted by grigby1 on Fri, 06/28/2019 - 9:40am
cloud computing security
data center architecture
network management datastore architecture
NMDA design
Protocol Security
pubcrawl
resilience
Resiliency
Scalability
SDN
SDN controllers
SDN security
software defined networking
biblio
NSF GENI cloud enabled architecture for distributed scientific computing
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
research institute
networking traffic
North Carolina
NSF GENI cloud enabled architecture
Open Resource Control Architecture
operating systems
ORCA based GENI rack
parallel processing
provisioned L2 network domain
pubcrawl
Renaissance Computing Institute
RENCI
networking systems
Resiliency
Scientific Computing Security
scientific information systems
SDN controllers
Servers
software defined networking
software defined networking controllers
United States
virtual laboratory
virtual machines
Global Environment-for-Network Innovations
Cloud Computing
cloud federation
cloud resources
Compositionality
computer architecture
data transfer
distributed resource orchestration system
distributed scientific computing
distributed systems
Fabrics
GENI resources
baremetals
graphical user interfaces
Hardware
high-performance computing
high-throughput computing
HPC
HTC
Internet2 L2 service
L2 network domain
Metrics
National Science Foundation funded program