Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
Constant-rate Coding for Multiparty Interactive Communication is Impossible
Submitted by dgoff on Mon, 03/06/2017 - 1:07pm
coding theory
communication complexity
Interactive communication
network topology
rate
Stochastic noise
biblio
Designing virus-resistant networks: A game-formation approach
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
optimal network topology
worst-case Nash equilibrium
Viruses (medical)
virus-resistant network design
virus security
virus resiliency
telecommunication network topology
Stability analysis
security
pubcrawl170108
pubcrawl170107
price of anarchy
Peer-to-peer computing
autonomous system
network topology
Nash Equilibrium
Nash equilibria
internet
global optimum
Games
game-formation approach
game theory
decentralized fashion
computer viruses
computer network security
biblio
"SRSC: SDN-based routing scheme for CCN"
Submitted by grigby1 on Tue, 02/21/2017 - 12:04pm
Protocols
Topology
telecommunication network routing
SRSC
software-defined networking
software defined networking
SDN-based routing scheme
scalable routing scheme
Routing
pubcrawl170103
CCN
process control
Peer-to-peer computing
NS-3 simulator
network topology
IP networks
Internet traffic
internet
content centric network
clean-slate approach
biblio
"WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns"
Submitted by abfox on Tue, 02/14/2017 - 1:37pm
Markov Models
WAP
Topology
system survivability
Survivability
Steady-state
soft impacts
security community
security
scanning nodes
rejuvenation
quarantine
pubcrawl170101
probability
network topology
Mathematical model
advanced persistent threat
malware infections
malware
invasive software
infection probability
four-node topology
false positives
false negatives
early malware detection
critical infrastructures
critical infrastructure sectors
Critical Infrastructure Protection
coordinated massive malware campaign assessment
contagion probability
Analytical models
advanced persistent threats
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:11am
internet
Topology
Sybil placement strategy statistical assessment
Stochastic processes
Stochastic Process
statistical analysis
Routing
peer-to-peer distributed hash tables
Peer-to-peer computing
packet level network simulation
network topology
invasive software
botnet command and control solution
interdefender coordination
diffused random graph
DHT-structured peer-to-peer botnets
DHT-structured P2P botnets
cyber security threat
Computers
computer network security
Computational modeling
compromised computer on-demand collections
command and control systems
C&C solutions
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
Submitted by BrandonB on Tue, 05/05/2015 - 12:31pm
network topology
state estimation
SOCCA
situational awareness
security-oriented cyber-physical contingency analysis
security
power system topology
power system security
power system planning
power system contingency
power infrastructures
power grids
physical components
accidental contingency
Mathematical model
malicious compromises
Indexes
grid operation
cyber-physical systems
cyber-physical security evaluation
cyber perspective
cyber network configuration
cyber components
control network
contingency analysis
Algorithm design and analysis
biblio
Models and tools for the high-level simulation of a name-based interdomain routing architecture
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
packet-level models
Topology
telecommunication traffic
telecommunication network topology
telecommunication network routing
sensitivity analysis
Routing
reusable traffic model
reusable topology model
reusable deployment model
Peer-to-peer computing
aggregate models
network topology
modular design
internet
high-level simulation methodology
global network architecture operation
global network architecture deployment
complex-dynamic behavior
clean slate name-based interdomain routing architecture
Approximation methods
Aggregates
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »