Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network configuration
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
Internet-of-Battlefield Things security
Topology
Scalability
Sawtooth
pubcrawl
Protocols
permissioned blockchain
network topology
network configuration
mission oriented tasks
military technology
military computing
IoBT environment
iobt
Internet-of-Things solutions
Ad hoc networks
Internet of Things
Human Factors
ergonomics
distributed ledger
Distributed databases
data communication
Cybersecurity
Cryptography
centralized communication technology
blockchain-integrated IoBT platform
blockchain usability
blockchain
Bandwidth
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 11:04am
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
Joint Channel Coding and Cooperative Network Coding on PSK Constellations in Wireless Networks
Submitted by aekwall on Mon, 11/25/2019 - 1:07pm
cooperative network coding
symbol error rate
RS channel codes
RS channel coded messages
relay
Reed-Solomon codes
Reed-Solomon channel coding
Reed-Solomon channel codes
PSK modulation
PSK constellations
Phase shift keying
nonbinary PSK modulated signals
network configuration
M−PSK modulation
joint error correction
joint channel coding
Resiliency
channel decoding
bit-level exclusive OR operation
wireless networks
relay networks (telecommunication)
network coding
error correction codes
encoding
Relays
error statistics
channel coding
Decoding
Metrics
composability
pubcrawl
biblio
SDN data path confidence analysis
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
Software-Defined Networks
Routing
SDN data path confidence analysis
SDN hybrid networks
secure network
Security Metrics
Security Policies Analysis
sensitive data
sensitive information
single metric indicator
software defined networking
Software-defined networking (SDN)
remediation costs
specific network path
Springs
stolen information
systemic network problems
time series
Time series analysis
time series data repository
tools
Traceroute
unauthorized access
latent network problems
autonomous systems
collaboration
competitors costs industry
Confidence Assessment
confidence score
configuration metrics
dependable network
domestic policy
foreign policy
internet
automated system protection services
Measurement
multifactor indicator analysis
network behavior
network configuration
network operation
network path confidence analysis service
OpenFlow
policy-based governance
proprietary information
pubcrawl