Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security
biblio
Resilient wireless communication networking for Smart grid BAN
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
smart grid BAN
network security
network topology
Redundancy
resilience
resilient wireless communication networking
round trip time
RTT
sensor placement
Single-hop network
network reliability
Smart Grids
smart meters
smart power grids
telecommunication network reliability
telecommunication network topology
telecommunication security
Wireless communication
wireless LAN
wireless technology
hybrid deployment
building area network
control centre
demand response function
distribution level
DR communication
end to end delay
home area network
home automation
home networks
backbone networks
IEEE 802.11 communication technology
IEEE 802.11 Standards
Infrastructure mode
infrastructure mode smart meter network
infrastructure single hop topology
mesh multiple hop topology
Multi-hop mesh network
network failure
biblio
ISO/IEC/IEEE International Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Part 1AR: Secure device identity
Submitted by BrandonB on Fri, 05/01/2015 - 8:57am
Local area networks
X.509
security
secure device identifier
secure association
port-based network access control
PKI
network security
Metropolitan area networks
MANs
MAC security
Access Control
LANs
ISO standards
information technology
IEEE standards
IEC standards
certificate
authorization
authentication
Access controls
biblio
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly
Submitted by BrandonB on Fri, 05/01/2015 - 8:38am
localized periodicity analysis
wavelet multiresolution analysis method
wavelet analysis
traffic anomaly
Time-frequency Analysis
RoQ attack
reduction of quality
network traffic
network security
Multiresolution analysis
misuse detection
Algorithm design and analysis
inhibit normal TCP flows
detection systems
detection algorithms
detection algorithm
denial of service attack
Correlation
computer network security
Computer crime
autocorrelation analysis
Anomaly Detection
biblio
Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis
Submitted by BrandonB on Fri, 05/01/2015 - 8:37am
Discrete Fourier transforms
Grippers
network security
persistent activity
slow-paced attack
Spectral analysis
spectrum analysis
time series
Time series analysis
time-domain analysis
Time-frequency Analysis
biblio
Collaboration Pattern and Topic Analysis on Intelligence and Security Informatics Research
Submitted by BrandonB on Fri, 05/01/2015 - 8:31am
network security
topic analysis
Terrorism
social networking (online)
Social network services
social network analysis approach
social network analysis
small-world effect
security of data
scale-free property
collaboration
ISI
Intelligent systems
intelligence and security informatics research
Intelligence and Security Informatics
Informatics
groupware
computer security
collaboration pattern
biblio
Secure distributed data structures for peer-to-peer-based social networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:22pm
online social network
trees (mathematics)
social networking (online)
Social network services
social enterprise network
secure distributed data structure
Public key
prefix trees
peer-to-peer technology
peer-to-peer networks
Peer-to-peer computing
Access Control
network security
global scale
file organisation
Distributed social networks
distributed list data structure
distributed hash table
distributed data management
data structures
authorisation
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Thu, 04/30/2015 - 12:59pm
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Securing Industrial Control Systems with a Simulation-based Verification System
Submitted by awhitesell on Tue, 01/13/2015 - 12:36pm
Science of Security
network security
Science of Security
UIUC
UIUC
Network Security
A Hypothesis Testing Framework for Network Security
biblio
Towards Correct Network Virtualization
Submitted by awhitesell on Tue, 01/13/2015 - 12:19pm
Science of Security
network security
NSA SoS Lablets Materials
Science of Security
UIUC
UIUC
Network Security
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
biblio
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Anomaly Detection
computer science
computer security
Computerized monitoring
Guidelines
Intrusion Detection
Laboratories
machine learning
National security
network security
privacy
telecommunication traffic
« first
‹ previous
…
42
43
44
45
46
47
48
49
50
next ›
last »