Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network flow
biblio
A Complex Network Approach to Power System Vulnerability Analysis based on Rebalance Based Flow Centrality
Submitted by grigby1 on Fri, 07/29/2022 - 8:03am
complex networks
power grid vulnerability analysis
power system vulnerability analysis
graph/network theory
network flow
power systems
Centrality
Power measurement
Metrics
adaptive systems
encoding
Planning
Scalability
Safety
Resiliency
resilience
pubcrawl
biblio
Evolutionary Design of Hash Functions for IPv6 Network Flow Hashing
Submitted by aekwall on Mon, 03/29/2021 - 11:07am
network flow
transport protocols
nondominated sorting genetic algorithm II
network monitoring probes
multiobjective evolutionary design method
linear genetic programming
IPv6 network flow hashing
IPv6 flow hashing
Internet Protocol
high-speed network systems
high-quality network flow hashing
genetic programming
Cartesian genetic programming
Monitoring
hash algorithms
Hash Function
evolutionary computation
Compositionality
Throughput
computer network
pubcrawl
Sorting
genetic algorithms
Resiliency
Task Analysis
IP networks
biblio
A Solution of Text Based CAPTCHA without Network Flow Consumption
Submitted by grigby1 on Thu, 03/18/2021 - 1:35pm
information processing
verification logic
text-based CAPTCHA
text based CAPTCHA
telecommunication traffic
software engineering
Servers
server
security risks
security
pubcrawl
network flow
information processing security issues
authorisation
Human behavior
high-security text-based CAPTCHA solution
formal verification
encryption
distributed information processing
composability
client-server systems
client malicious programs
client
captchas
CAPTCHA technology
biblio
Data Analysis for Anomaly Detection to Secure Rail Network
Submitted by aekwall on Mon, 11/23/2020 - 10:24am
Bidirectional control
Intelligent Data and Security
Intelligent Data Security
Wireshark detection
timely detection
secure rail network
railway communication
rail systems
rail network traffic data
Rail Network Security
packet analysis system
network flow
network features
IP networks
alert function
Rails
Compositionality
data analysis
Anomaly Detection
pubcrawl
Resiliency
Support vector machines
Protocols
telecommunication security
telecommunication traffic
Scalability
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 12:51pm
Metrics
Vulnerability
SIEM logs
security of data
Security Metrics
security assessment
security
Risk
pubcrawl
network flow
Network
Attack Circuit
IoT network security
IoT device security
Internet of Things
impact
graph theory
Exploitability
Computing Theory
attack graphs
attack graph
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Network Theory Based Power Grid Criticality Assessment
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
network theory
vulnerability assessment
Transmission line measurements
standard IEEE test cases
Resiliency
resilience
pubcrawl
power transmission lines
power grids
power grid vulnerability analysis
power grid vulnerability
power grid criticality assessment
power grid control center
power grid connectivity monitoring
network theory (graphs)
Australia
network flow problem
network flow
Metrics
maximum flow problem
linear programming problem
linear programming duality
Linear programming
Generators
flow network
energy management systems
Energy Management System
critical transmission lines identification
composability
blackout
biblio
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
Routing protocols
nods defection
open wireless medium
packet drop rate
packet dropping attack
packet forwarding
pubcrawl
reactive routing protocols
resilience
Resiliency
Routing
nodes unreliability
routing rules
security
self-configuring automatic vehicles
selfish behaviours
Selfish nodes
T-MANET
Tactical MANET
Tactical Mobile Ad-hoc NETworks
telecommunication security
Wireless communication
MANET
attack model
black hole
Compositionality
DSR routing protocol
energy consumption rate
gray hole
high dynamic network architecture
insider threat model
Insider Threats
malicious insider threats
Ad-Hoc Network
Measurement
Metrics
mobile ad hoc network
mobile ad hoc networks
network flow
Network Simulator 2
network throughput
nodes cooperation
nodes misbehavior