Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer networks
biblio
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking
Submitted by grigby1 on Mon, 04/06/2020 - 2:22pm
Proposals
network node
O2CEMF
off-path cache exploration
off-path cached content
off-path cached copies
off-path caches
On-demand exploration
original content publisher
network coding
pubcrawl
reachability information
Receivers
resilience
Resiliency
Routing
telecommunication network routing
cache storage
NC-NDN
named data networking
multiple on-path routes
multipath forwarding strategy
multipath forwarding
Metrics
internet
in-network caching
in-network caches
cyber physical systems
content delivery performance
computer networks
computer network security
composability
Complexity theory
biblio
Network Coding for Critical Infrastructure Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
Predictive Metrics
store-and-forward paradigm
programmable networks
programmable data-planes
P4 ecosystem
linear network coding
linear NC functions
intermediate network
Critical Infrastructure Networks
atomic coding primitives
network topology
cyber physical systems
linear codes
network coding
encoding
telecommunication security
Payloads
software defined networking
telecommunication network topology
computer network
computer networks
delays
resilience
Decoding
composability
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
Analysis of Machine Learning Techniques for Ransomware Detection
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
malware detection
Resiliency
ransomware families
Ransomware
Random Forest
Scalability
pubcrawl
policy-based governance
pattern classification
Metrics
CICAndMal2017 dataset
machine learning-based ransomware detection
machine learning
learning (artificial intelligence)
invasive software
Human behavior
cryptology
computer networks
composability
classification methods
biblio
Approaches for Collaborative Security Defences in Multi Network Environments
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
counteract everywhere approach
Scalable Security
timing influence defense efficiency
task execution order
multinetwork environments
multidomain defensive action
Multi-Domain Defense
minimize propagation approach
minimize countermeasure approach
distributed attacks
defense approaches
Defense Algorithms
Computer crime
computer networks
collaborative security defence approach
Collaborative Defense
edge computing
pubcrawl
security
Conferences
Scalability
Cloud Computing
computer network security
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Software-defined networking (SDN)
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
ongoing attacks
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
Internet connectivity
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Anomaly Detection
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
genetic algorithms
TSK+ fuzzy inference system
TSK+
Statistics
Sociology
Resiliency
pubcrawl
pattern classification
pathogenic associated molecular pattern
network intrusion detection
Mutual information
Intrusion Detection Systems
immune-inspired classification algorithm
Immune system
Anomaly Detection
Fuzzy sets
fuzzy reasoning
Fuzzy logic
Fuzzy inference systems
feature extraction
dendritic cell algorithm enhancement
Dendritic cell algorithm
danger theory
computer networks
computer network security
composability
artificial immune systems
artificial immune system
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
LevelTree: A New Scalable Data Center Networks Topology
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
shortest path
LevelTree
network topology
new scalable data center network topology
pubcrawl
resilience
Resiliency
Scalability
Servers
Jellyfish
telecommunication network routing
telecommunication network topology
topological properties
Topology
tree topology
Vegetation
VolvoxDC
Data Center Network(DCN)
Bisection Bandwidth
cloud based applications
computer centres
computer networks
Control Theory
critical topologies
Cyber Physical System
cyber physical systems
Bandwidth
data centers
DCN topology
Diameter of graph
Fattree
graph theory
high bisection bandwidth
Human behavior
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »