Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bandwidth
biblio
Security for Minimum Storage Regenerating Codes and Locally Repairable Codes
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
MR codes
telecommunication security
security
secure storage codes
Secure storage
Resiliency
resilience
repair efficient distributed storage systems
pubcrawl
precoding
passive eavesdropper
outer coset code
MSR codes
Bandwidth
minimum storage regenerating codes
Metrics
maximally recoverable codes
maintenance engineering
LRC codes
locally repairable codes
inner storage code
Cryptography
Compositionality
coding theory
codes
biblio
One more queue is enough: Minimizing flow completion time with explicit priority notification
Submitted by grigby1 on Wed, 02/21/2018 - 12:49pm
Resiliency
packet switching
policy governance
Policy-Governed Secure Collaboration
Processor scheduling
pubcrawl
queue
queueing theory
resilience
Metrics
scheduling
scheduling mechanism
switch priority queues
Switches
TCP
telecommunication traffic
transport protocols
fine-grained priorities
clean slate
clean-slate switch hardware
collaboration
commodity switches
computer centres
Conferences
Dynamic scheduling
EPN
Bandwidth
flow completion time
flow scheduling
flow size information
Hardware
Human behavior
human factor
Human Factors
biblio
DDoS attack isolation using moving target defense
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
Attack proxy
automation
Bandwidth
Computational modeling
computer architecture
Computer crime
Insider assisted DDoS attack
Metrics
moving target defense
MTD
pubcrawl
Resiliency
Servers
Shuffling
biblio
The distributed denial of service attacks (DDoS) prevention mechanisms on application layer
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
Http Post
tools
Slowloris
Servers
RUDY
Resiliency
pubcrawl
Metrics
IP networks
Human behavior
App-Ddos attacks
Http Get
Floods
Filtering
DNS
DDoS Attack Prevention
Computer crime
composability
Bandwidth
biblio
A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:26pm
Firewalls (computing)
smart power grids
Smart Grids
smart grid AMI networks
Servers
Resiliency
pubcrawl
power system security
power meters
Metrics
Infrastructure as a Service (IaaS)
Human behavior
Grid Openflow firewall (GOF)
advanced metering infrastructure
firewalls
Distributed Denial of Service (DDoS)
distributed denial of service
DDoS Attacks
DDoS attack mitigation
Computer crime
composability
cloud-based openflow firewall
cloud computing technology
Cloud Computing
Bandwidth
Advanced Metering Infrastructure (AMI)
biblio
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers
Submitted by K_Hooper on Wed, 12/20/2017 - 10:28am
Bandwidth
Cognitive Radio Security
Interference
Jamming
pubcrawl
Radio frequency
Resiliency
security
sensors
Wireless communication
biblio
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
Resiliency
vpn
Virtual private networks
uncontrolled networks
transport protocols
transport capacity
traffic pattern automatic adjustment
traffic normalization
Traffic analysis
telecommunication traffic
telecommunication network topology
telecommunication congestion control
TCP flows
Scalability
Bandwidth
rate-based congestion control mechanism
pubcrawl
Packet loss
overlay topology
overlay networks
network congestion avoidance
Logic gates
local network testbed
Cryptography
covert-channel-resistant congestion control
covert channels
Compositionality
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
Optimized Narrow-Band M2M Systems for Massive Cellular IoT Communications
Submitted by grigby1 on Thu, 04/20/2017 - 11:33am
Internet of Things
slotted-Aloha method
Resiliency
pubcrawl
Metrics
Markov processes
markov chain
machine-to-machine communications
machine-to-machine communication
M2M systems
LTE
Long Term Evolution
3GPP
Indexes
Human behavior
GSM
collaboration
clean-slate technologies
clean slate
cellular radio
cellular IOT communications
battery lifetime
Bandwidth
access protocols
biblio
Security function virtualization in software defined infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
SAVI SDI testbed
Whales
VNF
virtualized network function
virtualisation
software defined networking
software defined infrastructure
Software
Servers
security solution
security function virtualization
security attack
security
Bandwidth
pubcrawl170114
OPEX
network intrusion detection and prevention
IP networks
Inspection
honey-pot
DPI system
deep packet inspection system
computer network security
capital and operational expense
CAPEX
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »