Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network configurations
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
hierarchical attack graph
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
complex network
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
composability
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
computer network security
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
biblio
Stateless Security Risk Assessment for Dynamic Networks
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
computer science
Dynamic Networks and Security
unpredictable security postures
stateless security risk assessment
security overview
network states
Graphical security modeling
Emerging Networking Technology
emerging networking technologies
dynamic networks
network configurations
security posture
computer network security
NIST
risk management
Metrics
composability
pubcrawl
Resiliency
software defined networking
security
Conferences
Cloud Computing
biblio
Denial of Service Detection Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN)
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
mitigation scheme
anomalous mitigation solutions
anomaly detection schemes
Centroid-based-based clustering technique
data features
decision making skills
high rate denial of service attacks
high rate DoS attacks
intragroup variance
Kmeans
low rate detection
adaptive reconfigurable features
multivariate clustering method
multivariate gaussian distribution model
network performance statistics
ONOS SDN controller
open networking operating system
RAvN
responsive autonomic data-driven adaptive virtual networking framework
traffic monitoring tools
unsupervised machine learning technique
Autonomic Security
pubcrawl
computer network security
Monitoring
IP networks
telecommunication traffic
virtualisation
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
security of data
composability
Decision Making
network traffic
gaussian distribution
pattern clustering
Software-Defined Networks
Unsupervised Learning
adaptive systems
network configurations
adaptive policy updates
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
Machine Learning for Network Resiliency and Consistency
Submitted by grigby1 on Wed, 10/02/2019 - 1:55pm
global overview
software defined networking
security system
security
SDN
Resiliency
resilience
pubcrawl
programmable networking
network resiliency
network resilience
network consistency
network configurations
machine learning
learning (artificial intelligence)
adaptability
flow tables
feature extraction
deep learning architectures
deep learning
data privacy
convolutional neural networks
convolutional neural nets
consistency verification system
consistency test scenario
computer architecture
artificial intelligence resiliency system
Artificial Intelligence
ARS
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs