Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
A Graph-Theoretic Approach to Virtual Access Point Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
Correlation
security standpoint
standardization process
telecommunication network management
Resiliency
secure network
security
VAP identification algorithm
virtual access point correlation
wireless LAN
wireless networks
802.11 access point implementation
Communication system security
computer network security
pubcrawl
functional improvement
graph theory
graph-theoretic approach
IEEE 802.11 Standard
individual provider
insecure network
logically separate networks
nascent wireless functionality management
Network reconnaissance
network topology
physical equipment
Probes
biblio
A resilient distributed controller for software defined networking
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
software defined networking
Software
Resilient Security Architectures
resilient distributed controller
Resiliency
resilience
pubcrawl
Proposals
placement optimization
optimization
optimisation
network topology
control systems
control plane distribution
computer architecture
biblio
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Proactive Cyber Defence
infrastructure data analysis
Mission Assurance
mission-context information
near real-time defensive cyber operations
network operators
network responses
network topology
network-based CoA
network-based courses-of-action
Defence Research and Development Canada
pubcrawl
Resiliency
Responsive Cyber Defence
security
situational awareness
Software
Software Vulnerability Mitigation
vulnerability mitigation
Cyber Attacks
Automated computer network defence
Automated Cyber Defence
automated mission-oriented decision support
Automated Response Actions
composability
Computational modeling
computer architecture
computer network security
computer networks
ARMOUR
cyber defence integration framework
cyber defence science-and-technology platform
data analysis
Data models
data sources
Decision Making
decision support
Decision support systems
biblio
Multi-agent based intrusion prevention and mitigation architecture for software defined networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
multi-agent system
Topology
Software Defined Networks
Software
security
Resiliency
real-time systems
pubcrawl
network topology
composability
Metrics
Knowledge engineering
Intrusion Detection
Human behavior
DDoS Attack Prevention
DDoS
computer architecture
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
biblio
Constant-rate Coding for Multiparty Interactive Communication is Impossible
Submitted by grigby1 on Tue, 10/03/2017 - 11:57am
coding theory
communication complexity
Computing Theory
Computing Theory and Resilience
Interactive communication
network topology
pubcrawl
rate
resilience
Resiliency
Stochastic noise
biblio
Proposing, specifying, and validating a controller-based routing protocol for a clean-slate Named-Data Networking
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
Metrics
specification languages
specification language
Routing protocols
Routing
router memory requirement reduction
Resiliency
pubcrawl
protocol proposal description
Proposals
Petri nets
network topology
NDN routing schemes
clean slate
IP networks
internet
Human behavior
Future Internet
formal method
description language
CRoS behavior
controller-based routing protocol
control message overhead avoidance
collaboration
code signaling information
clean-slate named-data networking
biblio
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)
Submitted by grigby1 on Mon, 03/13/2017 - 12:23pm
mobile ad-hoc network
wumpus world concept
wireless mesh networks
telecommunication security
telecommunication network topology
telecommunication network routing
telecommunication network reliability
security enhancement
security
Routing attack
Routing
network topology
network survivability
network partitioning
mobile computing
Mobile communication
AMMNET
mobile ad hoc networks
Mesh networks
MANET
intragroup bridge router
intergroup bridge router
denial of service (dos)
computer architecture
communication reliability
Blackhole attack
Blackhole
bait detection scheme
Bait approach
Autonomous Mobile Mesh Network (AMMNET)
autonomous mobile mesh network
Artificial Intelligence
biblio
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
SNA technique
Honey-pots network
Hot-spots
internet
IP networks
network topology
pubcrawl170114
repeated system trespassing event network dynamics mapping
SNA
hacking spatial context
social network analysis technique
social networking (online)
spatial attributes
system trespassers
topological positions
Topology
victimized computers
attacker behavior
hacking patterns
hacking network topology
Hacking
hackers topology
Geography
geographic position
Cyberspace Policies
Cybersecurity
Cybercrime
Computers
computer networks
Computer hacking
Computer crime
brute force attacks
BFA
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »