Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Switches
biblio
Game-Theoretic Analysis for Security of Various Software-Defined Networking (SDN) Architectures
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
security performance analysis
computer network reliability
computer network security
Dynamic scheduling
dynamic scheduling mechanisms
dynamic SDN structures
dynamic systems
game theory
Resilient Security Architectures
Resilient Systems
security
game-theoretic analysis
software defined networking
software-defined networking architectures
Switches
system reliability analysis
Resiliency
Reliability
pubcrawl
Probes
Games
game-theoretic model
biblio
Model study of automatic and automated control of hysteretic object
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
feedback
Velocity control
variable structure systems
Uniform resource locators
Switches
sliding mode control
Resiliency
Regulators
pubcrawl
PI control
Oscillators
Numerical models
hysteresis
human reaction
feedback signal
artificial additional fluctuation
fast switching
Engines
control systems
control system synthesis
control signal
control loop
composability
closed loop systems
automobiles
automatic hysteretic object control
Automatic control
Automated Response Actions
automated hysteretic object control
biblio
Blocking intrusions at border using software defined-internet exchange point (SD-IXP)
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
denial of service
IP networks
Metrics
moving target defense
network security
pubcrawl
Reconnaissance
Resiliency
Software
software defined networking
Software Defined Networks
Switches
biblio
Mitigating HTTP GET flooding attacks in SDN using NetFPGA-based OpenFlow switch
Submitted by grigby1 on Tue, 01/16/2018 - 6:27pm
Human behavior
Uniform resource locators
Switches
Software-Defined Networking architecture
software defined networking
SDN
Resiliency
pubcrawl
Protocols
per-URL counting mechanism
OpenFlow
NetFPGA-based OpenFlow switch
Metrics
IP networks
composability
HTTP GET flooding attacks mitigation
HTTP GET Flooding
hardware-based defense system
Hardware
Floods
field programmable gate arrays
distributed denial-of-service attacks
DDoS Attacks
DDoS attack mitigation
DDoS
computer network security
Computer crime
biblio
DDoS Attack Mitigation in Internet of Things Using Software Defined Networking
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Monitoring
telecommunication traffic
Switches
software defined networking
Software
SDN
sampling-based anomaly detection
Routing
Resiliency
real-time systems
pubcrawl
OpenFlow
network security
ADS
Metrics
IoT systems
Internet of Things
Human behavior
DDoS attack mitigation
DDoS Attack
core networks
computer network security
Computer crime
composability
anomaly detection systems
anomaly detection algorithm
biblio
Detection and prevention of DoS attacks in Software-Defined Cloud networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
Resiliency
IP networks
IPS security
Metrics
network device
network scenarios
OFP
OpenFlow protocol
Protocols
pubcrawl
intrusion prevention system
SDC
SDN
Software Defined Clouds
software defined networking
Software-Defined Networking technology
Switches
SYN flooding attacks
vulnerable attacks
DDoS attack detection
Cloud Computing
Cloud Computing networks
composability
computer network security
control functions
control plane
data plane
DDoS
centralized controller
Denial-of-Service
distributed DoS attacks
distributed Firewall
distributed security mechanism
Firewall and IPS
Firewalls (computing)
Human behavior
ICMP flooding attacks
biblio
Cost sensitive moving target consensus
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
IDS signal
TV
Switches
state machine replication
software fault tolerance
security of data
Resiliency
pubcrawl
Protocols
network vulnerability
moving target defense
moving target consensus
intrusion tolerance
intrusion detection system signal
Analytical models
fault-tolerant service
Fault tolerant systems
fault tolerance
crash fault tolerant protocol
crash fault tolerance
Consensus
Computer crashes
composability
CFT protocol
Byzantine fault tolerant protocol
Byzantine Fault Tolerance
BFT protocol
biblio
A five-dimensional chaotic system with a large parameter range and the circuit implementation of a time-switched system
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
Lu system
time-switched system
Switching circuits
Switches
switched systems
Resiliency
pubcrawl
Poincare mapping
multiple chaotic attractors
microcontrollers
microcontroller unit
Metrics
Mathematical model
Lyapunov methods
Lyapunov exponent spectrum
Lyapunov exponent
antitranslation capability
Lu
information safety
five-dimensional chaotic system
field programmable gate arrays
digital circuit
Cryptography
composability
circuit implementation
chaotic system
chaotic encryption
chaotic cryptography
chaotic communication
chaos
bifurcation diagram
bifurcation
biblio
Measuring the effectiveness of SDN mitigations against cyber attacks
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
computer network security
human beings
Switches
secure autonomous response network
SDN mitigations
SARNET-agent
network security state
network function virtualisation
control loop
attack mitigation
captchas
CAPTCHA
Cyber Attacks
Computer crime
virtualisation
Servers
Software
composability
Software Defined Networks
Human Factors
Measurement
software defined networking
Human behavior
pubcrawl
biblio
Outsmarting Network Security with SDN Teleportation
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
network security
teleportation attacks
Teleportation
Switches
software-defined networking
software defined networking
Software
security policies
security
SDN teleportation
SDN
Scalability
Resiliency
pubcrawl
Backdoors
Malicious Switch
internet
intent-based networking
Heart
formally verifiable communication networks
design space
data plane
critical network functions
covert channels
control plane separation
computer network security
Compositionality
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »