Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Switches
biblio
The APT detection method in SDN
Submitted by K_Hooper on Wed, 05/09/2018 - 10:51am
OpenFlow
Switches
software programming
software defined networking
SDN security
SDN controller plane
SDN
Scalability
Resiliency
pubcrawl
process control
APT
network framework
HMM
Hidden Markov models
Discrete Fourier transforms
data plane
computer network security
Computer crime
communication protocol
APT detection method
biblio
Demonstrating State-Based Security Protection Mechanisms in Software Defined Networks
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
privacy
virtualisation
threat vectors
telecommunication control
Switches
switch identification
stateful data-plane designs
software radio
software defined networking
security of data
SDN-specific attacks
SDN-NFV
SDN security protection mechanisms
SDN configuration security protection mechanism
pubcrawl
adaptive network security services
Ports (Computers)
network function virtualization technologies
necessary control functions
Metrics
link reconfiguration
Customer Relationship Management
controller interaction
computer network security
computer network management
Communication networks
automated network security services
authentication
application program interfaces
biblio
Enhancing SDN Security for IoT-Related Deployments through Blockchain
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
resilience
IoT
IoT clouds
IoT-related deployments
jurisdictional boundaries
Metrics
national boundaries
network reconfiguration
networking paradigm
policy enforcement
pubcrawl
recently introduced Blockchain paradigm
render Blockchain
Internet-of-Things-related networking elements
Resiliency
safety-critical applications
SDN
SDN security
security
significant security factor
software defined networking
Switches
thorny issue
traditional networking deployments
Virtualization
cross national boundaries
blockchain security
Business
business activity
cloud
Cloud Computing
cloud computing infrastructure
composability
computer network security
Conferences
connected nodes
connected world
blockchain
dynamic manner
dynamic networks
efficient entity interconnection
efficient monitoring
emerging networking paradigm
geographic boundaries
increased attack surface
integrated world
intercloud communication
internet
Internet of Things
biblio
Enhancing SDN Security for IoT-Related Deployments through Blockchain
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
resilience
IoT
IoT clouds
IoT-related deployments
jurisdictional boundaries
Metrics
national boundaries
network reconfiguration
networking paradigm
policy enforcement
pubcrawl
recently introduced Blockchain paradigm
render Blockchain
Internet-of-Things-related networking elements
Resiliency
safety-critical applications
SDN
SDN security
security
significant security factor
software defined networking
Switches
thorny issue
traditional networking deployments
Virtualization
cross national boundaries
blockchain security
Business
business activity
cloud
Cloud Computing
cloud computing infrastructure
composability
computer network security
Conferences
connected nodes
connected world
blockchain
dynamic manner
dynamic networks
efficient entity interconnection
efficient monitoring
emerging networking paradigm
geographic boundaries
increased attack surface
integrated world
intercloud communication
internet
Internet of Things
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
networks security
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
IPv6 network
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
enterprise information protection
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
attacks
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience
biblio
One more queue is enough: Minimizing flow completion time with explicit priority notification
Submitted by grigby1 on Wed, 02/21/2018 - 1:49pm
Resiliency
packet switching
policy governance
Policy-Governed Secure Collaboration
Processor scheduling
pubcrawl
queue
queueing theory
resilience
Metrics
scheduling
scheduling mechanism
switch priority queues
Switches
TCP
telecommunication traffic
transport protocols
fine-grained priorities
clean slate
clean-slate switch hardware
collaboration
commodity switches
computer centres
Conferences
Dynamic scheduling
EPN
Bandwidth
flow completion time
flow scheduling
flow size information
Hardware
Human behavior
human factor
Human Factors
biblio
An enhanced security framework of software defined network based on attribute-based encryption
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
Access Control
computer architecture
encryption
fine-grained access control
network security
Network Security Architecture
pubcrawl
resilience
Resiliency
security threats
Software Defined Network
software defined networking
Switches
biblio
A resilient design for cyber physical systems under attack
Submitted by K_Hooper on Fri, 02/02/2018 - 11:07am
Monitoring
automata
controller
CPS
cyber channel
cyber-physical systems
data injection attack
engineered cyber physical systems
exponential stability
hybrid architecture
malicious intruder
Switches
observer-based detection mechanism
Observers
Passivation
passivity balance defense framework
pubcrawl
Resiliency
Resilient Security Architectures
security
security of data
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »