Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network operation
biblio
Research on Intelligent Network Operation Management System Based on Anomaly Detection and Time Series Forecasting Algorithms
Submitted by grigby1 on Wed, 08/23/2023 - 2:35pm
Anomaly Detection
pubcrawl
Scalability
network security
Prediction algorithms
operating systems
Software algorithms
Time series analysis
Time Series Prediction
Telecommunications
network operation
i-o systems security
Software Architecture
Intelligent networks
biblio
Alarm Correlation Method Using Bayesian Network in Telecommunications Networks
Submitted by grigby1 on Fri, 03/31/2023 - 7:26am
belief networks
Monitoring
pubcrawl
Metrics
Correlation
Topology
information technology
network topology
Telecommunications
Bayes methods
Bayesian network
Alarm Correlation
fault diagnosis
network operation
Root cause analysis
biblio
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
Submitted by grigby1 on Tue, 03/09/2021 - 1:50pm
Routing protocols
network operation
peer connections
Peer-to-peer computing
peering decision
peering dynamics
prefix hijacking attack
propagation delays
pubcrawl
public Bitcoin
Reliability
network adversary
routing-level attacks
security
sophisticated attack strategies
stealthier partitioning attack
targeted Bitcoin node
telecommunication network routing
telecommunication network topology
telecommunication traffic
time 5.0 week to 6.0 week
Bitcoin network
Scalability
Resiliency
Metrics
Human Factors
abundant network address resources
ASes
attack execution period
attack traffic rate
bitcoin
Bitcoin core
peer to peer security
Bitcoin peer-to-peer network
centralization problem
computer network security
eclipse attack
EREBUS attack
Human behavior
IP networks
Monitoring
natural man-in-the-middle network
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
Submitted by grigby1 on Fri, 08/14/2020 - 10:44am
orthogonal defense
global malware operations
law enforcement agencies
MALPITY
malware authors
malware families
malware spreading
malware tarpits
monetization techniques
command and control systems
POSIX
Sinkholing
Socket API
Tarpit
tarpit vulnerabilities
Unix
Winsock socket APIs
application programming interface
Dynamic Malware Analysis
Servers
pubcrawl
resilience
Resiliency
malware
invasive software
APIs
application program interfaces
Engines
Compositionality
network service
network operation
botnet
sockets
Grippers
botnet infrastructures
botnets
biblio
A Security-Constrained Islanding Feasibility Optimization Model in the Presence of Renewable Energy Sources
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
pubcrawl
off-line evaluation
optimal control
optimal control actions
optimization
possible islanding event
power distribution control
power distribution faults
power grids
power system security
power systems
Numerical models
renewable energy sources
representative HV subtransmission grid
RES available
resilience
Resiliency
security-constrained islanding feasibility optimization model
simulations
Smart Grids
supplied load
Wind farms
islanded operation feasibility
composability
CPS modeling
distributed power generation
dynamic simulations
frequency control
Generators
genetic algorithms
HV subtransmission level
integer programming
Islanded Operation
actual islanding
islanding conditions
load/generation shedding
loads
long-term security
Mathematical model
Metrics
mixed integer nonlinear problem
network operation
nonlinear programming
biblio
SDN data path confidence analysis
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
Software-Defined Networks
Routing
SDN data path confidence analysis
SDN hybrid networks
secure network
Security Metrics
Security Policies Analysis
sensitive data
sensitive information
single metric indicator
software defined networking
Software-defined networking (SDN)
remediation costs
specific network path
Springs
stolen information
systemic network problems
time series
Time series analysis
time series data repository
tools
Traceroute
unauthorized access
latent network problems
autonomous systems
collaboration
competitors costs industry
Confidence Assessment
confidence score
configuration metrics
dependable network
domestic policy
foreign policy
internet
automated system protection services
Measurement
multifactor indicator analysis
network behavior
network configuration
network operation
network path confidence analysis service
OpenFlow
policy-based governance
proprietary information
pubcrawl