Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Switches
biblio
A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network
Submitted by aekwall on Wed, 12/18/2019 - 2:26pm
internet
traditional network architecture
software-driven network
software-based networks
service attacks
new-machine learning-based collaborative DDoS mitigation mechanism
DDoS mitigation technique
DDoS detection
DDoS attack mitigation
Switches
resilience
Software Defined Network
Attack detection
SDN
Computer crime
Metrics
machine learning
composability
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
DDoS Attacks
software defined networking
security
telecommunication security
Servers
computer network security
biblio
Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN)
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
SDN
virtual machines
virtual machine
Software Defined Network (SDN)
sFlow mitigation technology
sFlow
real time detection
Mininet
DDoS attack mitigation
distributed denial of service attacks
telecommunication control
Switches
resilience
Attack detection
Computer crime
OpenFlow
network traffic
Metrics
composability
pubcrawl
Human behavior
DDoS Attacks
software defined networking
real-time systems
Protocols
telecommunication traffic
DDoS
computer network security
biblio
A Lightweight Compound Defense Framework Against Injection Attacks in IIoT
Submitted by aekwall on Mon, 12/02/2019 - 12:03pm
Switches
Smart industry
private networks
lightweight compound defense framework
lightweight authentication
injection attack event
injection attack
Industrial Internet of Things
IIoT Security
IIoT network protocols
field data
field agent
Compounds
compound approach
commands
command injection attacks
computer network security
Data Transmission
sensors
message authentication
authentication
production engineering computing
Industries
Metrics
composability
pubcrawl
Resiliency
software defined networking
Protocols
telecommunication security
Internet of Things
Cryptography
biblio
Physical Layer Security in Wireless Information and Power Transfer Millimeter Wave Systems
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
SWIPT
resilience
Resiliency
secrecy performance
secrecy probability
secure transmission performance
simulation results
simultaneous wireless information
stochastic geometry framework
reliable transmission performance
Switches
telecommunication network reliability
telecommunication security
Throughput
wireless channels
Wireless communication
wireless sensor networks
Communication system security
pubcrawl
probability
power transfer millimeter wave ultra-dense network
power transfer millimeter wave systems
physical layer security performance
physical layer security
network parameters
Millimeter-wave (mmWave)
Metrics
Information rates
energy-information coverage probability
energy coverage
effective secrecy throughput
confidential information rate
composability
biblio
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
Submitted by aekwall on Mon, 09/09/2019 - 10:47am
secure communication links
moving target defense (MTD)
MTD model
MTD-based security model
network architecture
Network Control
network device
network intruders
novel moving target defense technique
SDN security model
secure communication
message transmission
security solution
sensitive data leakages
Software-defined networking (SDN)
Switches
transmitted messages
user identities
user privacy protection
work-in-progress research
Predictive Metrics
OpenFlow
IP networks
Receivers
security
computer network management
Data models
Resiliency
pubcrawl
Routing
Data protection
software-defined networking
computer network security
Scalability
network management
Software-Defined Networks
moving target defense
centralized orientation
communication environment
communication links
Computer Network Attacks
computer networking
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 11:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
biblio
Collaborative Model-Based Fallback Control for Secured Networked Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
multiple countermeasures
Switches
Sports equipment
Sorting
sensors
security of data
security
secured networked control systems
scalable
Scalability
Resiliency
resilience
pubcrawl
Petri Net
networked control systems
Networked Control Systems Security
Industrial Control Systems
industrial control system security
industrial control
field network signal
cyber-attacks
countermeasure
control engineering computing
collaborative model-based fallback control
collaborative FCS
Collaborative Fallback Control System
collaboration function
collaboration
analog signal
biblio
Reliability Assessment of Distribution Network Considering Cyber Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
power distribution faults
System recovery
Switches
smart power grids
Smart Grid
SCADA systems
Resiliency
resilience
reliability assessment
Reliability
pubcrawl
power system stability
power system security
power system reliability
power engineering computing
power distribution reliability
Circuit faults
power distribution control
physical networks
lED
Intelligent sensors
intelligent electronic devices
IEEE-33-bus distribution system
fault recovery process
distribution network
distribution main station
cyberattack
cyber-physical systems
cyber networks
Cyber Attacks
computer network security
biblio
An Efficient Algorithm for Minimal Edit Cost of Graph Degree Anonymity
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
online social networks
Switches
social networks
social networking (online)
Social network services
social network graphs
social network data
Resiliency
resilience
pubcrawl
privacy
personal privacy
optimization
anonymity
Metrics
Human Factors
Human behavior
Heuristic algorithms
graph theory
graph k-degree anonymity
dynamic programming
delete edges
degree anonymity
data privacy
composability
biblio
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
Mobile Security
Switches
strong coercive multisnapshot adversaries
storage medium
smart phones
side-channel attacks
side channel attack
Scalability
Resiliency
resilience
pubcrawl
practical plausibly deniable encryption system
plausibly deniable encryption
PDE schemes
password
Multi snapshot Adversary
Android (operating system)
mobile device
MobiCeal
Metrics
LG Nexus 4 Android phone
Human Factors
Human behavior
fast switching
encryption
dummy write
decrypt data
Cryptography
block-based file systems
android encryption
Android 4.2.2
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »