Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Towards Data-Driven Characterization of Brute-Force Attackers
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
IP networks
unrelated IP addresses
timing information
timing
threat hunters
targeted attack campaigns
public Internet
pubcrawl
Protocols
policy-based governance
password
Organizations
meta data
malicious login attempts
low-threat attacks
attacker dictionary
invasive software
internet
Human Factors
Human behavior
dictionary-based brute-force attack
defensive measures
data-driven characterization
coordinated attacks
connection metadata
computer network security
clustering
brute-force login attempts
brute-force attackers
brute force attacks
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network administrators
university campus network
security risk
security analysts
Scalability
Resiliency
resilience
pubcrawl
passive network reconnaissance
network-connected devices
Network reconnaissance
affiliation graphs
management complexity
Local area networks
IP networks
internet
graph theory
future traffic demand
encryption-invariant device management strategy
device discovery and management
computer network management
biblio
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
Cloud Computing
Computer crime
control systems
denial-of-service attack
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Servers
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
High-Performance and Range-Supported Packet Classification Algorithm for Network Security Systems in SDN
Submitted by grigby1 on Tue, 02/23/2021 - 2:38pm
packet header bits
512-bit OpenFlow rule
Bit Vector-based packet classification methods
content-addressable storage
high clock frequency
key function
multidimensional fields
multifield matching
network security systems
Clocks
packet switching
range fields
range matching
Range Supported Bit Vector algorithm
Range-Supported packet classification algorithm
RSBV
rule sets
two-dimensional modular architecture
Communication networks
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Throughput
internet
security
composability
telecommunication network routing
encoding
pattern classification
SDN
software defined networking
pipeline processing
network coding
biblio
Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding
Submitted by aekwall on Mon, 02/22/2021 - 1:41pm
natural language processing
word embedding-based feature extraction
word embedding techniques
word embedding
vanilla word embeddings
telecommunication traffic
security of data
security
Scalability
Resiliency
representative features
pubcrawl
network traffic logs
anomalous IP address detection algorithm
machine learning-based anomaly detection
Log Mining
Linear programming
learning (artificial intelligence)
IP networks
IP addresses
Human behavior
feature extraction
detection performance
Clustering algorithms
Anomaly Detection
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
multihop scenarios
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
content transfer
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
Libraries
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
computer network security
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
Synergetic Denial-of-Service
named data networking
network architecture
normal IFAs
pubcrawl
Resiliency
Resists
Scalability
SDoS attacks
security of data
IP networks
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
underwater acoustic communication
underwater sensor networks
UWSN
wireless sensor networks
denial-of-service attack
security
attacker identification
attackers synergize
computer network security
computer science
Data Transmission
delays
Denial-of-Service
Underwater Networks
denial-of-service attacks
DoS attacks
future network architectures
Human behavior
increased network traffic
Interest Flooding Attack
interest flooding attacks
internet
biblio
Hybrid Network Mobility Support in Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:34pm
Internet architecture
TCP/IP address
signalling protocols
signaling protocols
producer mobility
network mobility
Multi-layer neural network
location addresses
Internet connection
hybrid network mobility support
efficient network mobility support scheme
consumer mobility
data retrieval
mobile nodes
IP networks
information-centric networking
Face
NDN
named data networking
internet
Routing
Routing protocols
pubcrawl
Human behavior
Resiliency
transport protocols
Scalability
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »