Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network topology
biblio
Data Conformity Evaluation: A Novel Approach for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
L1-norm
wireless sensor networks
tensors
tensor decomposition
telecommunication network topology
star topology network
security
Scalability
Resiliency
pubcrawl
principal-component-analysis
network topology
Metrics
blind attack detection method
Jamming
Iterative methods
IoT security
IoT networks
Internet of Things
Image edge detection
edge detection
data conformity evaluation
data conformity
computer network security
composability
biblio
A Topology Based Differential Privacy Scheme for Average Path Length Query
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Erbium
topology based differential privacy scheme
query function
privacy control parameters
node privacy protection
network vertices
edge-weighted privacy protection
differential privacy security mechanism
data query
average path length query
APL query
network topology
Euclidean distance
Scalability
Perturbation methods
Sensitivity
privacy protection
differential privacy
query processing
data availability
privacy
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
Sun
efficient hash-tree-based algorithm
hash tree efficiency
hash-tree based mining
hash-tree search method
mining efficiency
network physical connection data
sequential mining algorithm
sequential pattern mining
association rules
topology constraint
topology relation
topology structure
transmission network
transmission networks
warning Weblogs
hash algorithms
Pattern recognition
Resiliency
pubcrawl
internet
Business
trees (mathematics)
Data mining
network topology
network nodes
Conferences
Topology
telecommunication network topology
Compositionality
Hash functions
hash tree
tree searching
alarm association rules
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
biblio
Data forwarding and update propagation in grid network for NDN: A low-overhead approach
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
Named Data Network Security
update overheads
telecommunication network routing
storage overhead
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
network topology
NDN routing
NDN router High communication over-heads
NDN features
NDN
cache storage
named data network
low-overhead solution
low-overhead approach
Link State Data Base
IP networks
internet
information updates
Human behavior
grid network
forwarding
dominating set
Databases
communication overheads
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
NFV
VSNs
virtualisation
virtual shadow networks
telecommunication network topology
software defined networking technologies
software defined networking
Servers
SDN
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
overlay networks
centralized management
network topology
Network reconnaissance
network function virtualization
MTD
moving target defense
mirrors
link-map
ISP
Internet Service Provider networks
internet
flooding reconnaissance attacks
DDoS Attacks
computer network security
Computer crime
biblio
Vulnerability Analysis of Smart Grid under Community Attack Style
Submitted by grigby1 on Fri, 04/24/2020 - 4:37pm
Community theory
Power Grid Vulnerability Assessment
Vulnerability Analysis
Power system protection
power system faults
power lines
Power Grid
Power cables
MLRM
minimum load reduction model
linear programming problem
Linear programming
information network
England 39 nodes system
cyber network
controllable power nodes
pubcrawl
community attack style
cascading failure process
cascading failure
failure analysis
Metrics
network topology
power system control
Smart Grids
Load modeling
composability
smart power grids
Smart Grid
Generators
Resiliency
resilience
biblio
A Novel Self Oscillating Class Phi2 Inverter Topology
Submitted by grigby1 on Fri, 04/24/2020 - 4:08pm
single transistor
power conversion
power topologies
privacy
pubcrawl
resilience
Resiliency
self oscillating
self oscillating class phi2 inverter topology
power conversio GaN
Topology
topology behaviour
transistor switching signal
Transistors
VHF
VHF circuits
VHF oscillators
voltage 20.0 V
inverter
Class ϕ2
composability
drain signal
fast transient inverter topology
feedback circuit
frequency 1.0 MHz
frequency 30.0 MHz to 300.0 MHz
Gallium nitride
Capacitors
Inverters
invertors
Logic gates
Metrics
network topology
oscillating behaviors
Oscillators
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »