Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
A Crawler-based Digital Forensics Method Oriented to Illegal Website
Submitted by grigby1 on Fri, 09/01/2023 - 2:19pm
network topology
network crime
illegal website
Crawler
Human Factors
Crawlers
automation
information forensics
information management
Digital Forensics
Tag clouds
internet
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Two-Stage AES Encryption Method Based on Stochastic Error of a Neural Network
Submitted by grigby1 on Thu, 08/03/2023 - 12:56pm
Topology
Forward Error Encryption
Reverse Neural Network Functional Operator
passwords
neural network
Neurons
Prediction algorithms
network topology
composability
encryption
Cryptography
AES
Resiliency
resilience
Metrics
pubcrawl
Training
biblio
Efficiently Constructing Topology of Dynamic Networks
Submitted by grigby1 on Wed, 07/12/2023 - 11:49am
security
pubcrawl
Metrics
resilience
Resiliency
privacy
Topology
composability
real-time systems
network topology
Satellites
dynamic networks
security protection
Minimization
Dynamic Network
topology construction
biblio
Hierarchical Association Features Learning for Network Traffic Recognition
Submitted by grigby1 on Wed, 07/12/2023 - 11:49am
composability
graph attention networks
representation learning
Traffic classification
dynamic networks
information processing
network intrusion detection
deep neural networks
network topology
feature extraction
telecommunication traffic
Correlation
Resiliency
resilience
Metrics
pubcrawl
security
biblio
D-ViNE: Dynamic Virtual Network Embedding in Non-Terrestrial Networks
Submitted by grigby1 on Wed, 07/12/2023 - 11:48am
Dynamic scheduling
VNF Mapping
Virtual Network Embedding (VNE)
Virtual Link
satellite networks
Software-defined networking (SDN)
Costs
dynamic networks
Satellites
Network Function Virtualization (NFV)
security
network topology
Benchmark testing
composability
Heuristic algorithms
Conferences
Resiliency
resilience
Metrics
pubcrawl
biblio
Black Hole Detection and Prevention Using Digital Signature and SEP in MANET
Submitted by grigby1 on Thu, 06/29/2023 - 11:03am
encryption
pubcrawl
resilience
Resiliency
Scalability
Topology
network topology
Receivers
Market research
digital signatures
information processing
Black hole attack
Discovery Process
External and Internal Attacks in MANETs
Magnets
biblio
Message Source Identification in Controller Area Network by Utilizing Diagnostic Communications and an Intrusion Detection System
Submitted by grigby1 on Fri, 05/12/2023 - 9:11am
Planning
Vehicular and wireless technologies
Vehicle configuration identification
Topology
Source identification
security
Resiliency
resilience
Regulation
pubcrawl
CAN Intrusion Detection System
network topology
Intrusion Detection
Human Factors
Human behavior
Diagnostic communication
Controller area network (CAN)
controller area network
Companies
biblio
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division
Submitted by grigby1 on Fri, 04/28/2023 - 2:59pm
network topology
level division
layer division
cyberspace security structure
policy governance
Resiliency
computer theory
graph theory
Cyberspace
computational complexity
Compositionality
collaboration
computer security
composability
Topology
Computational modeling
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Sequential Topology Attack of Supply Chain Networks Based on Reinforcement Learning
Submitted by grigby1 on Fri, 04/14/2023 - 3:05pm
search problems
pubcrawl
resilience
Scalability
network topology
Robustness
Power system protection
Reinforcement learning
simulation
supply chains
Chained Attacks
Resiliency
sequential attacks
supply chain networks
biblio
Star-Bridge: a topological multidimensional subgraph analysis to detect fraudulent nodes and rings in telecom networks
Submitted by grigby1 on Fri, 03/31/2023 - 10:20am
Shape
Stars
Network Control
Fraud Type
Fraud Networks
Fraud Enabler
Bridging Centrality
Resiliency
big data security metrics
pubcrawl
Bridges
Measurement
network topology
Big Data
Industries
Scalability
resilience
1
2
3
4
5
6
7
8
9
…
next ›
last »