Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Switches
biblio
Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
efficient service delivery
Switches
DDoS detection
Meters
data plane
denial-of-service attack
network resources
centralized controller
attack volume
OpenFlow protocol
network safe
network security threat
networking infrastructure
OpenFlow enabled SDN
UDP flooding
user datagram protocol
DDoS attack mitigation
composability
computer network security
DDoS
IP networks
software defined networking
DDoS Attacks
Resiliency
Human behavior
pubcrawl
Computer crime
Protocols
Metrics
internet
Entropy
OpenFlow
SDN
Bandwidth
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
biblio
Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:09am
persistent jamming attack
internal hardware Trojans
jamming attack
low-power transceivers
ML classifiers
network-on-chip communications
NoC switches
nonscalable multihop data transmission paths
On chip interconnect
On chip security
on-chip data transfer
on-chip wireless medium
denial-of-service attacks
radio transceivers
radiofrequency interconnections
random burst error correction code
Switches
switching networks
WiNoC security
wired NoC architectures
wireless interconnection
Wireless NoC
wireless NoC architectures
network on chip security
system-on-chip
telecommunication security
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Wireless communication
Metrics
machine learning
telecommunication network routing
telecommunication computing
radio networks
Scalability
DoS
Hardware Security
error correction codes
radiofrequency interference
DoS attack
Jamming
denial-of-service attack
machine learning classifier
HT
network-on-chip
data transfer security threats
biblio
Designing Security-Aware Service Requests for NFV-Enabled Networks
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
service function chains
Resiliency
resource allocation
resource allocation problem
resource management
security
security aspects
security of data
security requirements
security-aware service request design
resilience
software images
specialized hardware appliances
Substrates
supported service
Switches
virtualisation
Virtualization
virtualization privacy
load-balancers
best practices
Cloud Computing
cloud-based applications
composability
Hardware
high-volume servers
Human behavior
Human Factors
initial SFC requests
Bandwidth
Metrics
network function virtualization
network functions
network service request
NFV environment
NFV-enabled networks
privacy
pubcrawl
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
Authenticated Network Coding for Software-Defined Named Data Networking
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Switches
Software-Defined named Data Networking
MIP problem
Internet architecture
homomorphic signature scheme
cooperative network coding mechanism
authenticated network coding
cyber physical systems
cache storage
network coding
Homomorphic encryption
encoding
Predictive Metrics
security of data
named data networking
cooperative communication
digital signatures
internet
optimization
Routing
composability
pubcrawl
Resiliency
software defined networking
security
biblio
Quantum Services Architecture in Softwarized Infrastructures
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
quantum technologies
mature development
network integration
open Interfaces.
QKD systems
quantum principles
quantum random number generators
quantum resources
Quantum services architecture
Quantum Switch
quantum switches
Madrid Quantum Network
quantum-safe methods
SDN quantum node architecture
secure bit streams
service automation
single network element
software-defined networking architectures
softwarized infrastructures
specific network cards
Telecommunication standards
quantum computing security
quantum cryptography
security
Protocols
computer architecture
software defined networking
Resiliency
pubcrawl
composability
standards
software-defined networking
quantum computing
Scalability
quality of service
random number generation
security infrastructure
Switches
Predictive Metrics
Quantum Key Distribution
current networking technology
forward key material
key exchange primitive
logically centralized SDN controller
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
SDN
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
Mathematical model
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
Adaptive immune system
layer immune inspired framework
Innate immune system
Immune system
human immune system
dynamic network threats
DoS mitigation
DoS flooding attacks
denial of service attack
data layer
control layer
computer network security
biologically inspired architecture
Biologically Inspired
bio-inspired framework
adaptive layer
biblio
A Scientific Data Traffic Scheduling Algorithm Based on Software-Defined Networking
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Scientific Computing Security
traffic scheduling algorithm
traffic scheduling
telecommunication scheduling
SDN-based traffic scheduling algorithm
scientific data transfer
scientific data traffic scheduling algorithm
scientific data flow transfer
scientific big data transfer
Science DMZ model
Scheduling algorithms
private network
network security devices
data plane
common data flow
software-defined network
computer network security
Compositionality
scientific information systems
Predictive Metrics
Switches
resilience
Firewalls (computing)
delays
Bandwidth
software-defined networking
pubcrawl
software defined networking
data flow computing
performance evaluation
telecommunication traffic
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »