Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer networks
biblio
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Submitted by BrandonB on Wed, 05/06/2015 - 9:13am
content-centric networking architecture
unicast delivery
Unicast
Topology
semi-stateless forwarding scheme
Probabilistic logic
Ports (Computers)
ISP topologies
data structures
adaptive forwarding
Conferences
Computers
computer networks
computer architecture
CCN architecture
Bloom filter-based stateless forwarding
Bandwidth
biblio
Ontology based approach for perception of network security state
Submitted by BrandonB on Tue, 05/05/2015 - 12:08pm
automation
computer network security
computer networks
Hardware
Manuals
network operating system
network operating systems
Network Security Status
Network Situational awareness
Ontologies
ontologies (artificial intelligence)
Ontology
security
taxonomy
taxonomy classes
biblio
Applying Formal Methods to Networking: Theory, Techniques, and Applications
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
Internet community
Tutorials
software defined networking
Software
SDN
Protocols
networking protocols
network infrastructure
Mathematics
Internet culture
applying formal methods
Internet architecture
internet
formal verification
formal specifications
formal correctness
Computers
computer networks
Communities
clean slate Internet design
biblio
Attacks and Defenses in the Data Plane of Networks
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
NetFPGA
software-programmable network processors
software vulnerabilities
security issues
Routing protocols
programmable router
Program processors
processing monitor
packet processing software
packet forwarding
network security
network routers
network processor
network attack
Computer crime
logic devices
internet
hardware-based defense mechanism
field programmable gate arrays
embedded systems
embedded system security
denial-of-service attack
data plane
custom-logic hardware
control plane
computer networks
computer network security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10