Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
When Analog Meets Digital: Source-Encoded Physical-Layer Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Relays
wireless networks
TWRC PLNC
two-hop node coordination
Topology
Throughput
telecommunication traffic
spread spectrum communication
Source-Encoded PLNC scheme
Source-Encoded Physical-Layer Network Coding
source coding
SE-PLNC
Resiliency
Ad hoc networks
relay networks (telecommunication)
pubcrawl
Predictive Metrics
physical-level network coding
network topology
network coding
multipath relaying opportunities
multihop wireless networks
cyber physical systems
composability
channel coding
ad-hoc networks
biblio
Network Coding for Critical Infrastructure Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
Predictive Metrics
store-and-forward paradigm
programmable networks
programmable data-planes
P4 ecosystem
linear network coding
linear NC functions
intermediate network
Critical Infrastructure Networks
atomic coding primitives
network topology
cyber physical systems
linear codes
network coding
encoding
telecommunication security
Payloads
software defined networking
telecommunication network topology
computer network
computer networks
delays
resilience
Decoding
composability
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
Modeling Virtual Machine Migration as a Security Mechanism by using Continuous-Time Markov Chain Model
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
Migration
VM migration
Virtual machining
virtual machines
virtual machine security
virtual machine migration modeling
static security measures
sophisticated methods
Servers
security of data
security mechanism
security
pubcrawl
probability
network topology
model migration
Adaptation models
Markov processes
intrusion
dynamic security measure
dynamic security
dynamic attack surface
destination server parameters
Destination Server
continuous-time Markov Chain model
Computational modeling
complex networks
complex network
cloud environment
cloud computing environment
Cloud Computing
biblio
Switching Topology for Resilient Consensus Using Wi-Fi Signals
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
Topology
societal integration
Switches
switching signal
switching topology
Sybil attack
sybil attacks
telecommunication network topology
telecommunication security
telecommunication switching
security
true graph
untrustworthy agents
untrustworthy transmissions
Wi-Fi signals
wireless channels
Wireless communication
wireless LAN
wireless sensor networks
wireless transmissions
multirobot team security
Communication system security
composability
connected topology
graph theory
initial topology
legitimate agents
Metrics
multi-robot systems
multiagent consensus
arbitrary malicious node values
network topology
physical networks
physical properties
probability
pubcrawl
resilience
Resiliency
resilient consensus
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
network topology
WEKA
threat vectors
Support vector machines
support vector machine
software defined networking
security threat protection
SDN network
SDN
random forests
Random Forest
pubcrawl
privacy
Computer crime
nearest neighbour methods
Metrics
Measurement
machine learning
k-nearest neighbors
J48
Floods
distributed denial-of-service attack
DDoS attack detection
DDoS
control systems
computer network security
biblio
A Trusted Routing Mechanism for Mobile Social Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
path trust level
trusted path
trusted DSR routing mechanism
Trust Routing
trust level
TDR protocol
social networking (online)
Scalability
Routing protocols
Routing Protocol
route cost
pubcrawl
composability
packet delivery fraction
network topology
network performance
network communication
MSN
mobile social networks
mobile social network
mobile radio
mobile computing
DSR routing protocol
computer network security
biblio
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
Routing
white-box switch
white visor
white box cryptography
Virtualization
virtualisation
virtual network
virtual machines
Virtual machine monitors
Switches
software-defined networking
software defined networking
composability
Resiliency
resilience
pubcrawl
Pipelines
networking fabrics
network virtualization
network topology
network management
network hypervisor
Metrics
computer network management
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »