Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer networks
biblio
Reliability Evaluation for a Cloud Computer Network with Fog Computing
Submitted by aekwall on Mon, 06/28/2021 - 12:36pm
IoT
software reliability
Servers
Scalability
Resiliency
pubcrawl
performance evaluation
network reliability
Multi state
Fog computing
Fog Computing and Security
edge computing
data communication
computer networks
computer network reliability
Cloud Computing
security
biblio
Anomaly-based IDS to Detect Attack Using Various Artificial Intelligence Machine Learning Algorithms: A Review
Submitted by grigby1 on Fri, 04/09/2021 - 11:34am
IDS
Signature-based Intrusion Detection Systems & Anomaly-based Intrusion Detection Systems
NSL-KDD
multiple machine learning algorithms
machine learning algorithms
identifying attacks
ID
detect attack
current IDS
computer safety hazards
complex & increasing tasks
artificial intelligence & machine learning algorithms
anomaly-based IDS
accurate intrusion detection
learning (artificial intelligence)
cyber-attacks
resilience
computer networks
Attack detection
network security
composability
intrusion detection system
Artificial Intelligence
computer network security
Resiliency
pubcrawl
cyber security
security of data
biblio
An Active Defense Model and Framework of Insider Threats Detection and Sense
Submitted by grigby1 on Thu, 04/08/2021 - 4:54pm
computer networks
Systems engineering education
SEnSE
insider threats detection
insider threat sense
hierarchy-mapping based insider threats model
Fellows
Electronic equipment
active defense model
Systems engineering and theory
detection
model
computer science education
insider threat
Metrics
computer security
Information systems
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
Monitoring
information security
security of data
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
error correction codes
pollution attack
Pollution
network error correction
network coding security
information-theoretic approach
Information rates
cryptographic signature
cryptographic approach
information theoretic security
multicast communication
Upper bound
error correction
network coding
Scalability
computer networks
information security
information theory
Metrics
Cryptography
wireless sensor networks
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Fuzzy Logic based Network Intrusion Detection Systems
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
intrusion detection system
security
rule base generation steps
Resiliency
resilience
pubcrawl
normal network traffic
noisy data
NIDSs
network intrusion detection systems
network connectivity
Metrics
malicious activities
abnormal network traffic
interpolation
fuzzy rule interpolation
fuzzy logic based solutions
Fuzzy logic
feature extraction
false positive classification
electronic communication
Cyber Physical System
computer networks
computer network security
computer network
biblio
Security Enhancement for the Network Amalgamation using Machine Learning Algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 3:02pm
Human behavior
Task Analysis
Security Metrics
security enhancement
security
Scalability
resilience
pubcrawl
Protocols
network vulnerabilities
network amalgamation
Monitoring
Metrics
machine learning algorithms
learning (artificial intelligence)
machine learning
feature extraction
data transaction
Data Security
computer networks
computer network security
computer network
BIOS
biometrics (access control)
biometric authenticity
Bio-metric authenticity
privacy
composability
Resiliency
biblio
Quantifying the impact of network congestion on application performance and network metrics
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
Degradation
work factor metrics
packet transmission statistics
network counters
modern high-performance computing systems
intensive MPI operations
HPC network architecture
dragonfly topology
Aries network
application performance
network congestion
network metrics
network architecture
message passing
Scalability
HPC
Processor scheduling
telecommunication network topology
parallel processing
Topology
computer networks
Measurement
telecommunication network routing
Correlation
pubcrawl
Resiliency
Conferences
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
Protocols
SDN technology
real-time entropy features
Partial flow
packet count entropies
openflowbased switch capabilities
OpenFlow
DDoS attack detection capabilities
categorized partial-flows
software-defined networking
DDoS attack detection
computer networks
Switches
software defined networking
SDN
Internet of Things
real-time systems
composability
Entropy
Computer crime
internet
IoT devices
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
feature extraction
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »