Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
linear SVM
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
SDN
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
software defined networking
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
security of data
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
biblio
Multimodal Graph Analysis of Cyber Attacks
Submitted by grigby1 on Fri, 12/11/2020 - 1:34pm
pubcrawl
Metrics
multimodal graph
multimodal graph analysis
multimodal graph approach
multimodal graph nodes
nodes classification
observed cyber events
privacy
Malware Analysis
resilience
Resiliency
security of data
single-modality graphs
strong inter-modal ties
targeted nodes
unclassified regime
cyber-attacks
attack stages
attacker
autonomous systems
Centrality
centrality analysis
community analysis
Computational modeling
Cyber Attacks
Analytical models
cyberattack
cyberattack victims
Data mining
graph theory
Human behavior
IP networks
malware
biblio
Moving Bits with a Fleet of Shared Virtual Routers
Submitted by grigby1 on Tue, 12/01/2020 - 3:36pm
Scalability
Metrics
networking community
offloading network functionality
on-demand instances
Policy Based Governance
price disparity
Pricing
pubcrawl
resilience
Resiliency
IP transit prices
shared virtual routers
telecommunication network routing
telecommunication network topology
third-party cloud spot instances
traffic demands
transit providers
unit pricing
virtual network provider
virtualisation
Economics
bandwidth costs
Cloud Computing
cloud providers
cloud-assisted networks
collaboration
composability
computing resources
data transfer
data transfers
dedicated resources
Bandwidth
flexible network service chains
Human behavior
Human Factors
internet
Internet core hubs
Internet ecosystem
Internet-scale Computing Security
Internet-scale interconnections
IP networks
biblio
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
Submitted by grigby1 on Tue, 12/01/2020 - 12:47pm
network traffic
learning (artificial intelligence)
low-dimensional features
machine learning
Measurement
minority class instances
multiclass classification show
multiclass combined performance metric
network intrusion detection system
IP networks
PCA
PCA-based dimensionality reduction
principal component analysis
pubcrawl
resilience
Resiliency
security of data
Support vector machines
feature dimensionality reduction approach
Bayesian network
belief networks
binary classification
CICIDS2017 network intrusion dataset
class distribution parameters
composability
detection rate
dimensionality reduction
Bayes methods
feature extraction
high-dimensional features
IDS
imbalanced class distributions
imbalanced data
imbalanced distribution
intrusion detection system
biblio
LD-ICN: Towards Latency Deterministic Information-Centric Networking
Submitted by aekwall on Mon, 11/30/2020 - 11:04am
numerous 5G applications
customized end-to-end resource reservation
deterministic latency
hard latency requirements
ICN cache placement problem
IP-based QoS mechanisms
latency deterministic information-centric networking
Latency Deterministic Networking
LD-ICN
content distribution
on-path caching technique
optimal cache placement
real-time latency measurement
relevant content objects
route oscillation
source routing-based latency telemetry
telemetry
Internet-scale Computing Security
quality of service
real-time systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
telecommunication network routing
IP networks
Oscillators
information centric networking
cache storage
in-network caching
policy governance
cache coordination
cache reservation
content cache
biblio
A Distributed Interdomain Control System for Information-Centric Content Delivery
Submitted by aekwall on Mon, 11/30/2020 - 11:02am
Information-Centric Networking (ICN)
CURLING supports efficient Internet-scale content delivery
CURLING system
current Internet
distributed interdomain control system
domain-level Internet subtopologies
dynamic alternative paths
efficient content delivery
facto platform
host-centric
Information-Centric content delivery
cost-efficient Internet-scale content delivery
information-centric networking paradigm
interdomain hop-by-hop content resolution mechanism
IP-based Internet
large-scale content distribution
manageability
network operators
network policies
Software-defined networking (SDN)
tight coupling
Internet-scale Computing Security
control systems
IP networks
Resiliency
Human behavior
pubcrawl
composability
Routing
Metrics
internet
content management
Business
automobiles
Scalability
consumers
data planes
in-network caching
Future Internet
policy governance
content delivery
content delivery paths
content sources
control content access
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 10:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »