Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
A Design of Digital Signature Mechanism in NDN-IP Gateway
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
Internet architecture
TCP/IP technology
NDN-TCP/IP
NDN-IP gateway
NDN-IP Custom-Router Gateway
NDN-based network implementation
IP-based network
IP addresses
gateway
digital signature processing
digital signature mechanism
data naming
data authenticity
computer network security
digital signature
named data networking
NDN
internetworking
digital signatures
internet
pubcrawl
Resiliency
security
Scalability
IP networks
biblio
Fast Reconfigurable Hash Functions for Network Flow Hashing in FPGAs
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
high-quality hash functions
Resiliency
resilience
Registers
reconfigurable hash function
reconfigurable design
reconfigurable architectures
pubcrawl
network flow hashing
multiobjective linear genetic programming
Monitoring
Linear programming
IP networks
Compositionality
high speed computer networks
hash function design
hash algorithms
hardware acceleration
Hardware
genetic programming
genetic algorithms
FPGA
field programmable gate arrays
field programmable gate array
fast reconfigurable hash functions
Cryptography
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 9:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
biblio
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 2:54pm
internet
Scalability
safety hazard
Resiliency
resilience
rapidly volatile attacks
pubcrawl
network security
Named Data Network Security
named data network
malicious interest packets
IP-based networks
IP networks
Internet architecture
Bandwidth
information-centric networking
IFA countermeasures
IFA attackers
Human behavior
Fluctuations
Flooding Attacks
Entropy
DoS attacks
detection accuracy
computer network security
computer architecture
channel capacity
biblio
Interest Flooding Attack Mitigation in Named Data Networking Based VANETs
Submitted by grigby1 on Fri, 05/29/2020 - 2:53pm
Scalability
named data networking
NDN
network applications
poisoning cache attack
privacy violation
pubcrawl
resilience
Resiliency
Named Data Network Security
security susceptibilities
storage management
telecommunication network routing
VANETs
vehicular
vehicular ad hoc networks
Vehicular Named Data Network
VNDN
ICN
CCN
computer network security
content distribution
conventional IP based system
data fetching
data privacy
Flooding
Human behavior
Ad Hoc
IFAMS scheme
Information Centric Network
Interest
interest flooding attack mitigation scheme
internet
IP based Internet
IP networks
mobility management
biblio
Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With the Named Data Architecture
Submitted by aekwall on Tue, 05/26/2020 - 10:11am
stand-alone node RSU
intelligent transport system (ITS)
intermittent connection lifetime
multihop wireless network
named data architecture
named data network (NDN)
named data networking approach
NDN architecture
network simulator
NS3 software packages
RA-NDN protocol
real-world data
SA-RSU
improved network connectivity
SUMO software packages
TCP/IP implementation
total dissemination time
traffic load
traffic simulator software
vehicle to roadside unit (V2R)
vehicular ad hoc network (VANET)
vehicular densities
vehicular NDN
vehicular transmission ranges
Named Data Network Security
internet
IP networks
Scalability
Servers
telecommunication traffic
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Routing protocols
Roads
vehicular ad hoc networks
computer network security
radio networks
VANET
data storage
computer network reliability
vehicular ad hoc network
vehicles
ad hoc communications
data dissemination
data dissemination protocol
data received ratio
distributed roadside unit
biblio
Data forwarding and update propagation in grid network for NDN: A low-overhead approach
Submitted by aekwall on Tue, 05/26/2020 - 10:10am
Named Data Network Security
update overheads
telecommunication network routing
storage overhead
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
network topology
NDN routing
NDN router High communication over-heads
NDN features
NDN
cache storage
named data network
low-overhead solution
low-overhead approach
Link State Data Base
IP networks
internet
information updates
Human behavior
grid network
forwarding
dominating set
Databases
communication overheads
biblio
CUIF: Control of Useless Interests Flooding in Vehicular Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 10:10am
safety related applications
content name
Control of Useless Interests Flooding
CUIF scheme
data
efficient communication environment
Interest forwarding storm
outgoing Interest packets
Producer vehicle
NDN
traditional host centric approach
vehicle address
Vehicular Ad-hoc Network
vehicular information network technology
Vehicular Named Data Network
Vehicular Named Data networks
VNDN
Named Data Network Security
Roads
Scalability
Servers
security
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
IP networks
VANETs
vehicular ad hoc networks
internet
VANET
Interest
named data networks
vehicular
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »