Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Locality Guided Neural Networks for Explainable Artificial Intelligence
Submitted by aekwall on Mon, 03/01/2021 - 5:04pm
Semantics
training networks
Self-Organizing Map
Self-organizing feature maps
self-organising feature maps
locality guided neural network
current deep network architectures
AI methods
explainable artificial intelligence
CIFAR100 dataset
deep learning architecture
xai
Scalability
visualization
Topology
convolutional neural networks
network topology
convolutional neural nets
CNN
machine learning
Neurons
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
biblio
Vicinity-based Replica Finding in Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
content delivery performance
vicinity-based replica finding scheme
sub-optimal delivery efficiency
replica finding mechanism
replica finding efficiency
overhead costs
network overhead
NDN forwarding
NDN architectures
default forwarding
content object
content identifier
computer network security
named data networking
Routing protocols
network topology
telecommunication network routing
internet
Routing
pubcrawl
Human behavior
Resiliency
Scalability
network security
biblio
RPL Assessment using the Rank Attack in Static and Mobile Environments
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
energy consumption
Damage Assessment
Static environment
rank attack
Mobility
mobile environment
Informatics
Technological innovation
RPL
security
Measurement
network topology
Topology
Resiliency
resilience
pubcrawl
IoT
biblio
SDN-based multi-controller optimization deployment strategy for satellite network
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
load difference
satellite network
Satellites
network delay
network performance
adjacent low load controller
high load state
high-load state
high-load switch
idle state
satellite communication
low-load controller
multicontroller optimized deployment strategy
network topology high dynamic changes
normal state
optimize deployment
overload state
SDN-based multicontroller optimization deployment strategy
SDN-based satellite network controllers
dynamic networks
telecommunication traffic
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
security
Topology
composability
delays
pubcrawl
network security
telecommunication control
software defined networking
Switches
network topology
Software Defined Network
optimisation
telecommunication network topology
biblio
Performance Evaluation of Data Center Network with Network Micro-segmentation
Submitted by grigby1 on Tue, 02/16/2021 - 12:44pm
security idea
network topology
network traffic
performance evaluation
performance evaluation results
pubcrawl
resilience
Resiliency
search engines
security
network microsegmentation
social networks
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Topology
zero trust security
zero trust security model
data center network
Cisco Application Centric Infrastructure
Cloud Computing
cloud-based applications
composability
computer centres
computer network performance evaluation
computer network security
data center infrastructure
zero trust
data center network performance
data centers
Data models
dynamic data center
dynamic networks
high-performance requirements
Metrics
micro-segmentation
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
Attack Graph Generation and Visualization for Industrial Control Network
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
Industrial control network
vulnerability correlation method
vulnerability classification and correlation
visualization technology
Uplink
three-dimensional interactive attack graph visualization tool
Resiliency
pubcrawl
Predictive Metrics
network topology
network model
large-scale visualization
integrated circuits
attack graph
industrial control
graph theory
Firewalls (computing)
Downlink
data visualisation
Correlation
computer network security
composability
complete attack graph analysis
attack graphs
attack graph generation
attack graph algorithm
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »