Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
packet forwarding
biblio
Scalable Impact Range Detection against Newly Added Rules for Smart Network Verification
Submitted by aekwall on Mon, 05/03/2021 - 1:14pm
packet forwarding
packet equivalence class
network verification
impact range recognition
Hasse diagram
scalable verification
Compositionality
Predictive Metrics
Scalability
Cloud Computing
Firewalls (computing)
detection algorithms
pubcrawl
Resiliency
Internet of Things
Access Control
Servers
IP networks
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Reputation and trust based selfish node detection system in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
mobile ad hoc network
trust based selfish node detection system
telecommunication network routing
selfish
Routing protocols
routing layer
Routing
Resiliency
pubcrawl
packet forwarding
node authentication
node
network channel jamming
mobile ad hoc networks
Base stations
misbehavior
Metrics
Measurement
MANETs
MANET Attack Detection
MANET
Load modeling
detection
control systems
Conferences
composability
cellular telephones
biblio
Malicious insider threats in tactical MANET: The performance analysis of DSR routing protocol
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
Routing protocols
nods defection
open wireless medium
packet drop rate
packet dropping attack
packet forwarding
pubcrawl
reactive routing protocols
resilience
Resiliency
Routing
nodes unreliability
routing rules
security
self-configuring automatic vehicles
selfish behaviours
Selfish nodes
T-MANET
Tactical MANET
Tactical Mobile Ad-hoc NETworks
telecommunication security
Wireless communication
MANET
attack model
black hole
Compositionality
DSR routing protocol
energy consumption rate
gray hole
high dynamic network architecture
insider threat model
Insider Threats
malicious insider threats
Ad-Hoc Network
Measurement
Metrics
mobile ad hoc network
mobile ad hoc networks
network flow
Network Simulator 2
network throughput
nodes cooperation
nodes misbehavior
biblio
"Routing in the Centralized Identifier Network"
Submitted by grigby1 on Tue, 02/21/2017 - 11:57am
IP networks
telecommunication network routing
telecommunication links
tailor-made router
software defined networking
Software Defined Network
scaling problems
Routing protocols
Routing
router link states gathering
pubcrawl170103
packet forwarding
network functions resplitting
network flexibility
network adaptability
Aerospace electronics
internet
identifier/locator separation
identifier-locator separation
host mobility
globally unique ID
Databases
controller cluster design
control plane/forwarding plane separation
control plane-forwarding plane separation
computer architecture
clean-slate network architecture
CIN routing
centralized identifier network routing
biblio
Scalable Packet Classification for Datacenter Networks
Submitted by BrandonB on Wed, 05/06/2015 - 11:58am
IP networks
VLANs
VLAN
virtual machines
telecommunication network routing
storage penalty
Software
Scalability
router architectures
packet forwarding
packet classification
Local area networks
length combinations
classification rules
Indexes
hash table
hardware parallelism
Hardware
firewalls
encoding
encoded rule expansion
Decision trees
datacenter networks
datacenter network
data structures
computer centres
biblio
Attacks and Defenses in the Data Plane of Networks
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
NetFPGA
software-programmable network processors
software vulnerabilities
security issues
Routing protocols
programmable router
Program processors
processing monitor
packet processing software
packet forwarding
network security
network routers
network processor
network attack
Computer crime
logic devices
internet
hardware-based defense mechanism
field programmable gate arrays
embedded systems
embedded system security
denial-of-service attack
data plane
custom-logic hardware
control plane
computer networks
computer network security