Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
TendrilStaller: Block Delay Attack in Bitcoin
Submitted by grigby1 on Fri, 09/04/2020 - 2:59pm
Distributed databases
TendrilStaller
peer-to-peer network
eclipse attack
countermeasure
blockchain state
block propagation protocol
block propagation
block delay attack
Bitcoin protocol
Bitcoin peer-to-peer network
bitcoin security
bitcoin
IP networks
Security analysis
cryptocurrencies
Human behavior
pubcrawl
Peer-to-peer computing
Cryptographic Protocols
Bandwidth
blockchain
Scalability
delays
Protocols
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
Engines
brute force attacks
SQL-like syntax
SQL
network flows
network attacks
multistage HTTP brute force attack detection
flow-based detection methods
Event Processing Language
ESPER
EPL
detection method
complex event processing
CEP
security
policy-based governance
transport protocols
Human Factors
Databases
Uniform resource locators
Force
collaboration
pubcrawl
network security
Monitoring
IP networks
computer network security
biblio
Security Enhancement in Storage Area Network
Submitted by grigby1 on Fri, 08/28/2020 - 2:55pm
security level
resilience
Resiliency
SAN
SAN Perfromance factors
SAN protocols
SAN security framework
Scalability
security
security enhancement
public clouds
security perspective
security solution
security vulnerabilities
Servers
storage area network
Storage area networks
storage management
storage technologies
information security
cashing technologies
centralized secure place
computer network security
DAS
digital transformation
direct attached storage
Distributed databases
distributed storage technology
geographical remote locations
big data security metrics
IP networks
network attached storage
Optical fiber LAN
Optical fibers
private clouds
private nodes
Protocols
pubcrawl
biblio
Denial of Service Detection Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN)
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
mitigation scheme
anomalous mitigation solutions
anomaly detection schemes
Centroid-based-based clustering technique
data features
decision making skills
high rate denial of service attacks
high rate DoS attacks
intragroup variance
Kmeans
low rate detection
adaptive reconfigurable features
multivariate clustering method
multivariate gaussian distribution model
network performance statistics
ONOS SDN controller
open networking operating system
RAvN
responsive autonomic data-driven adaptive virtual networking framework
traffic monitoring tools
unsupervised machine learning technique
Autonomic Security
pubcrawl
computer network security
Monitoring
IP networks
telecommunication traffic
virtualisation
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
security of data
composability
Decision Making
network traffic
gaussian distribution
pattern clustering
Software-Defined Networks
Unsupervised Learning
adaptive systems
network configurations
adaptive policy updates
biblio
Automated Event Prioritization for Security Operation Center using Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
automation
SOC workflow
SOC event classification
Security Operation Center
graphical analysis
event classification
deep neural network model
cybersecurity clearinghouse
critical security events
automated event prioritization
SIEM
Incident Response
security data
encoding
security event
Automated Response Actions
security of data
internet
pattern classification
neural nets
graph theory
deep learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Data models
Task Analysis
security
IP networks
IDS
biblio
Attribute-Based Accountable Access Control for Multimedia Content with In-Network Caching
Submitted by aekwall on Mon, 08/17/2020 - 10:43am
telecommunication control
service requirement
service accounting
secure access control
Multimedia content security
multimedia content retrieval
multimedia content provider
multimedia content distribution
IP traffic
informal security analysis
in-network content caching
in-network caching
edge router side
attribute-based accountable access control scheme
access policy based authentication
IP networks
Multimedia communication
Streaming media
authentication
telecommunication network routing
policy-based governance
pubcrawl
Human behavior
telecommunication security
attribute-based encryption
encryption
Cryptography
Access Control
telecommunication traffic
Scalability
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
hybrid deep neural network design
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
Matrix converters
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
CNN
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
computer network security
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
biblio
Design of APT Attack Defense System Based on Dynamic Deception
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
dynamic IP address generation method
advanced persistent threat attack
APT attack defense system
APT defense system framework
deception defense process
defense APT attacks
defense system
DHCPv6
dynamic deception
APT attack
dynamic policy allocation mechanism
dynamic timing selection method
hybrid encryption communication mechanism
SM4
Socket
sockets
Viterbi algorithm
Cryptography
Firewalls (computing)
APT
advanced persistent threat
Dynamic scheduling
Metrics
Scalability
Heuristic algorithms
computer network security
Resiliency
resilience
Human behavior
pubcrawl
IP networks
Servers
encryption
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 9:28am
adaptive filters
adaptive filtering
Tofino switch
programmable switches
NETHCF
memory usage
memory resources
IP2HC
IP-to-Hop-Count mapping table
IP popularity
in-network system
HCF system
end-to-end routing
design adaptive mechanisms
adaptive spoofed IP traffic filtering
computer network security
telecommunication switching
Switches
Pipelines
Bandwidth
telecommunication network routing
internet
Metrics
pubcrawl
Resiliency
Kernel
telecommunication traffic
Servers
Scalability
IP networks
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »