Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Switches
biblio
An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
secured communication
Cognitive Radio Security
weighted graph problem
V2V communications
stable transmission path
stable paths
spectrum awareness
shared common channels
secured paths
mobility pattern
efficient routing performance
efficient reactive routing protocol
dynamic behavior
cognitive radio sensor networks
channel availability
Ad hoc networks
telecommunication security
cognitive radio
source node
Routing Protocol
spectrum availability
WSN
Switches
delays
Reliability
Routing
graph theory
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
Constrained Interval Type-2 Fuzzy Classification Systems for Explainable AI (XAI)
Submitted by aekwall on Mon, 03/01/2021 - 5:01pm
xai
type-reduction step
output interval centroid
IT2
interval type-2 fuzzy logic
inherently interpretable structure
fuzzy logic systems
explainable type-2 fuzzy systems
explainable CIT2 classifiers
constrained interval type-2 fuzzy sets
constrained interval type-2 fuzzy classification systems
Constrained interval type-2
classification reliability
explainable artificial intelligence
Intelligent systems
Scalability
explainable AI
Artificial Intelligence
Switches
Linguistics
Fuzzy sets
Indexes
Generators
fuzzy set theory
Fuzzy logic
natural language
pattern classification
Shape
pubcrawl
Resiliency
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 1:00pm
Switches
φ-entropy
SDN networks
network cyber security
forwarding logic
DDoS traffic formation
control logic
DDoS attack detection method
distributed denial of service attack
DDoS attack detection
denial-of-service attack
information entropy
network architecture
DDoS
microsoft windows
IP networks
Attack detection
software defined networking
SDN
telecommunication traffic
composability
Entropy
Computer crime
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
Protocols
SDN technology
real-time entropy features
Partial flow
packet count entropies
openflowbased switch capabilities
OpenFlow
DDoS attack detection capabilities
categorized partial-flows
software-defined networking
DDoS attack detection
computer networks
Switches
software defined networking
SDN
Internet of Things
real-time systems
composability
Entropy
Computer crime
internet
IoT devices
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
feature extraction
biblio
DDoS Attack Detection and Mitigation at SDN Data Plane Layer
Submitted by grigby1 on Tue, 02/16/2021 - 12:57pm
SDN specifications
programming
pubcrawl
Python
quality of service
resilience
Resiliency
SDN
SDN data plane layer
SDN data-plane
SDN environment
OpenFlow
Servers
Software
software defined networking
software-defined networking
Switches
telecommunication traffic
time 100.0 s to 150.0 s
virtualisation
written SDN application
forwarding plane
Automated Secure Software Engineering
centralized control point
composability
computer network security
control plane
DDoS Attack
DDoS attack detection
denial-of-service attack
distributed denial-of-service attack
DDoS attack mitigation
Human behavior
malicious traffic abnormal behavior
Metrics
network functions
network infrastructure
normal traffic
open daylight controller
Open vSwitch programmability feature
Opendaylight
biblio
SDN-based multi-controller optimization deployment strategy for satellite network
Submitted by grigby1 on Tue, 02/16/2021 - 12:46pm
load difference
satellite network
Satellites
network delay
network performance
adjacent low load controller
high load state
high-load state
high-load switch
idle state
satellite communication
low-load controller
multicontroller optimized deployment strategy
network topology high dynamic changes
normal state
optimize deployment
overload state
SDN-based multicontroller optimization deployment strategy
SDN-based satellite network controllers
dynamic networks
telecommunication traffic
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
security
Topology
composability
delays
pubcrawl
network security
telecommunication control
software defined networking
Switches
network topology
Software Defined Network
optimisation
telecommunication network topology
biblio
A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit
Submitted by grigby1 on Mon, 01/25/2021 - 11:30am
power consumption
Voltage regulators
voltage regulator module
Voltage control
Switches
side-channel vulnerability
side-channel
security of data
Resiliency
resilience
Regulators
Receivers
pubcrawl
power system management
Power Management.
power management unit
Air gaps
Phasor measurement units
modern microprocessors
modern computers
microprocessor chips
Microarchitecture Vulnerability
microarchitectural vulnerability
Metrics
Human Factors
Human behavior
electromagnetic-based side-channel
electromagnetic emanations
DVFS
computer power supplies
composability
Capacitors
biblio
Classifier with Deep Deviation Detection in PoE-IoT Devices
Submitted by aekwall on Mon, 01/11/2021 - 1:37pm
Decision trees
vulnerable IoT devices
PoE-IoT devices
PoE-IoT classification
poe
network traffic characteristics
ML
edge intelligence
deep deviation detection
behavior analysis
dpi
deep packet inspection
IoT
Switches
Cameras
computer network security
firmware
Image edge detection
Decision Tree
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
feature extraction
security
Internet of Things
telecommunication traffic
Scalability
Monitoring
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »