Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
named data network
biblio
A Secured Dialog Protocol Scheme Over Content Centric Networks
Submitted by grigby1 on Fri, 08/25/2023 - 9:58am
Servers
pubcrawl
resilience
Resiliency
Scalability
internet
Streaming media
Information Centric Networks
Libraries
named data network
Routing protocols
TCPIP
information-centric networking
Chat application
Content-Centric Network
information-centric network
biblio
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 12:35pm
computer science
Tree network topologies
Randomized LFU
Internet requirements
ICN primary features
content replacement scheme
computer network
caching strategy
caching algorithms
Cache Replacement Strategy
Abilene network topologies
named data network
in-network caching
Time complexity
cache storage
information-centric networking
Scalability
named data networking
network performance
telecommunication network topology
delays
network traffic
trees (mathematics)
internet
convergence
Computational modeling
simulation
pubcrawl
Human behavior
Resiliency
telecommunication traffic
biblio
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 2:54pm
Mobility
telecommunication network routing
specific user
Servers
Scalability
Resiliency
resilience
Receivers
pubcrawl
promising information-centric networking architectures
potential receivers
network architecture
named data networking
Named Data Network Security
named data network
Access Control
internet
Industries
Human behavior
fine-grained access control mechanism
fine-grained access control
FGAC-NDN
desired file
desired content
DBDH assumption
data confidentiality
computer science
cache storage
Bilinear Pairing
authorisation
biblio
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 2:54pm
internet
Scalability
safety hazard
Resiliency
resilience
rapidly volatile attacks
pubcrawl
network security
Named Data Network Security
named data network
malicious interest packets
IP-based networks
IP networks
Internet architecture
Bandwidth
information-centric networking
IFA countermeasures
IFA attackers
Human behavior
Fluctuations
Flooding Attacks
Entropy
DoS attacks
detection accuracy
computer network security
computer architecture
channel capacity
biblio
Data forwarding and update propagation in grid network for NDN: A low-overhead approach
Submitted by aekwall on Tue, 05/26/2020 - 10:10am
Named Data Network Security
update overheads
telecommunication network routing
storage overhead
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
network topology
NDN routing
NDN router High communication over-heads
NDN features
NDN
cache storage
named data network
low-overhead solution
low-overhead approach
Link State Data Base
IP networks
internet
information updates
Human behavior
grid network
forwarding
dominating set
Databases
communication overheads
biblio
Security Issues in Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 10:10am
privacy
Named Data Network Security
named data networks
content distribution network
CDN
cache
named data network
survey
security issues
NDN
Routing protocols
security
computer security
internet
pubcrawl
Human behavior
Resiliency
computer architecture
Internet of Things
Scalability
IP networks
computer network security
biblio
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers
Submitted by aekwall on Tue, 05/26/2020 - 10:10am
nondesignated receivers
data reencryption
file transfer protocol
Formal Security Models
FTP-NDN
named data network
Named Data Networking (NDN)
NDN nodes
network flow requirement
data confidentiality
re-encryption
storage costs
TCP-IP networks
unknown potential receivers
usage amount
users
video services
Named Data Network Security
transport protocols
Scalability
Servers
telecommunication traffic
Cryptography
Access Control
Receivers
Protocols
computer architecture
computer network security
Resiliency
Human behavior
pubcrawl
internet
network traffic
ciphertext transmission
complete secure file transfer protocol
biblio
A Detection and Defense Approach for Content Privacy in Named Data Network
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
named data network
tools
telecommunication network topology
telecommunication network routing
telecommunication channels
signature based defense
side-channel timing response
side-channel timing attack
Scalability
Resiliency
resilience
pubcrawl
privacy
NDN
Named Data Network Security
Attack detection
IP networks
internet
delays
data privacy
Cryptography
countermeasure methods
content privacy
consumer privacy
computer network security
Cathode ray tubes
cache storage
brute force timing attack
brute force attack model
biblio
Evaluating Machine Learning Algorithms for Detection of Interest Flooding Attack in Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 2:36pm
Human behavior
ICN
IFA
information centric networking
Interest Flooding Attack
named data network
Named Data Network Security
NDN
pubcrawl
resilience
Resiliency
Scalability
security in NDN