Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer network
biblio
A Secured Botnet Prevention Mechanism for HTTP Flooding Based DDoS Attack
Submitted by grigby1 on Fri, 04/14/2023 - 4:00pm
Distribute Denial Of Service
Servers
Resource Request Rate
Resiliency
resilience
pubcrawl
network security
Metrics
maintenance engineering
Invisible Challenge
HTTP Flood Attacks
botnet
denial-of-service attack
DDoS Attacks
computer networks
computer network
Compositionality
composability
Companies
CAPTCHA
botnets security
Botnet Attacks
biblio
Research on Computer Network Security Framework Based on Concurrent Data Detection and Security Modelling
Submitted by aekwall on Fri, 01/13/2023 - 4:03pm
Drives
Computational modeling
Data models
Scalability
pubcrawl
Semantics
Compositionality
network security
Syntactics
computer network
Concurrent Data Detection
security framework
Security Modelling
security scalability
biblio
Research on Computer Network Information Security Problems and Prevention Based on Wireless Sensor Network
Submitted by grigby1 on Tue, 04/19/2022 - 10:38am
computer network
computer networks
encryption
information security
Market research
pubcrawl
real-time systems
resilience
Scalability
sensor security
Stability analysis
wireless sensor
wireless sensor networks
biblio
Construction of Computer Network Security Defense System Based On Big Data
Submitted by grigby1 on Tue, 03/01/2022 - 4:34pm
big data security in the cloud
Big Data
Cloud Computing
computer architecture
computer network
computer networks
computer science
Network Security Architecture
Network Security Defense System
pubcrawl
resilience
Resiliency
security
Systems architecture
biblio
Compression Optimization For Automatic Verification of Network Configuration
Submitted by grigby1 on Thu, 02/24/2022 - 12:30pm
NP-C
signal processing
security
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
Path Algebra
Paralysis
Automatic Reasoning
network compression
internet
Experimental Network Verification
computer network reliability
computer network
Computational modeling
Compositionality
composability
collaboration
biblio
Fuzzy Logic based Network Intrusion Detection Systems
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
intrusion detection system
security
rule base generation steps
Resiliency
resilience
pubcrawl
normal network traffic
noisy data
NIDSs
network intrusion detection systems
network connectivity
Metrics
malicious activities
abnormal network traffic
interpolation
fuzzy rule interpolation
fuzzy logic based solutions
Fuzzy logic
feature extraction
false positive classification
electronic communication
Cyber Physical System
computer networks
computer network security
computer network
biblio
Evolutionary Design of Hash Functions for IPv6 Network Flow Hashing
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
network flow
transport protocols
nondominated sorting genetic algorithm II
network monitoring probes
multiobjective evolutionary design method
linear genetic programming
IPv6 network flow hashing
IPv6 flow hashing
Internet Protocol
high-speed network systems
high-quality network flow hashing
genetic programming
Cartesian genetic programming
Monitoring
hash algorithms
Hash Function
evolutionary computation
Compositionality
Throughput
computer network
pubcrawl
Sorting
genetic algorithms
Resiliency
Task Analysis
IP networks
biblio
Security Enhancement for the Network Amalgamation using Machine Learning Algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 3:02pm
Human behavior
Task Analysis
Security Metrics
security enhancement
security
Scalability
resilience
pubcrawl
Protocols
network vulnerabilities
network amalgamation
Monitoring
Metrics
machine learning algorithms
learning (artificial intelligence)
machine learning
feature extraction
data transaction
Data Security
computer networks
computer network security
computer network
BIOS
biometrics (access control)
biometric authenticity
Bio-metric authenticity
privacy
composability
Resiliency
biblio
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
computer science
Tree network topologies
Randomized LFU
Internet requirements
ICN primary features
content replacement scheme
computer network
caching strategy
caching algorithms
Cache Replacement Strategy
Abilene network topologies
named data network
in-network caching
Time complexity
cache storage
information-centric networking
Scalability
named data networking
network performance
telecommunication network topology
delays
network traffic
trees (mathematics)
internet
convergence
Computational modeling
simulation
pubcrawl
Human behavior
Resiliency
telecommunication traffic
biblio
Network Intrusion Detection Using Improved Genetic k-means Algorithm
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
k-means++ algorithm
Training
Time complexity
Resiliency
pubcrawl
Prediction algorithms
personal privacy theft
pattern clustering
Partitioning algorithms
network intrusion detection
network intrusion
Metrics
KDD-99 dataset
KDD-99
Clustering algorithms
intrusion detection system
Intrusion Detection
internet
IGKM algorithm
IGKM
Genetics
genetic k-means algorithm
genetic algorithms
data privacy
computer network security
computer network
composability
1
2
next ›
last »