Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network architecture
biblio
Quantifying the impact of network congestion on application performance and network metrics
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
Degradation
work factor metrics
packet transmission statistics
network counters
modern high-performance computing systems
intensive MPI operations
HPC network architecture
dragonfly topology
Aries network
application performance
network congestion
network metrics
network architecture
message passing
Scalability
HPC
Processor scheduling
telecommunication network topology
parallel processing
Topology
computer networks
Measurement
telecommunication network routing
Correlation
pubcrawl
Resiliency
Conferences
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
Synergetic Denial-of-Service
named data networking
network architecture
normal IFAs
pubcrawl
Resiliency
Resists
Scalability
SDoS attacks
security of data
IP networks
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
underwater acoustic communication
underwater sensor networks
UWSN
wireless sensor networks
denial-of-service attack
security
attacker identification
attackers synergize
computer network security
computer science
Data Transmission
delays
Denial-of-Service
Underwater Networks
denial-of-service attacks
DoS attacks
future network architectures
Human behavior
increased network traffic
Interest Flooding Attack
interest flooding attacks
internet
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 1:00pm
Switches
φ-entropy
SDN networks
network cyber security
forwarding logic
DDoS traffic formation
control logic
DDoS attack detection method
distributed denial of service attack
DDoS attack detection
denial-of-service attack
information entropy
network architecture
DDoS
microsoft windows
IP networks
Attack detection
software defined networking
SDN
telecommunication traffic
composability
Entropy
Computer crime
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 1:36pm
deep packet inspection approaches
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
Software-Defined Networks
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
pubcrawl
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Inspection
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
biblio
Mission Resilience for Future Army Tactical Networks
Submitted by grigby1 on Tue, 10/06/2020 - 2:10pm
Mission critical systems
Weapons
traditional engineering methods
Task Analysis
tactical network architectures
tactical network
tactical forces
Streaming media
sensors
Resiliency
resilience
pubcrawl
psychometric
network architecture
mission resilience metrics
mission essential functions
autonomous vehicles
Mission Assurance
mission
military operations
military communication
Measurement
future army tactical networks
cyber-physical systems
cyber resilience metrics
cyber physical systems
Cyber Physical System
cyber assets
CPS resilience
command and control systems
battlefield operations
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
Optimization Strategy of Flow Table Storage Based on “Betweenness Centrality”
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
policy governance
virtualisation
telecommunication switching
telecommunication network topology
telecommunication control
Switches
software defined networking
Software Defined Network
SDN switch
SDN Flow table optimization
Roads
Resiliency
pubcrawl
Protocols
betweenness centrality
optimization
optimisation
network virtualization
network technology
network architecture
Metrics
Human behavior
flow table storage
Flow Table Optimization
Cloud Computing
clean slate
Big Data
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
Electrocardiography
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
ethereum
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
resilience
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
Logic gates
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
« first
‹ previous
1
2
3
4
5
6
next ›
last »