Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Security Issues in Named Data Networks
Submitted by aekwall on Tue, 05/26/2020 - 10:10am
privacy
Named Data Network Security
named data networks
content distribution network
CDN
cache
named data network
survey
security issues
NDN
Routing protocols
security
computer security
internet
pubcrawl
Human behavior
Resiliency
computer architecture
Internet of Things
Scalability
IP networks
computer network security
biblio
Secure Route Selection Mechanism in the Presence of Black Hole Attack with AOMDV Routing Algorithm
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Blackhole attack
trusted network
terminal node
single attack
sensitive field
secure route selection mechanism
police rescue operation
origin node
collaborative attack
Black hole attack
AOMDV routing algorithm
AOMDV
adversarial network setting
security mechanism
IP networks
mobile ad hoc networks
MANET
collaboration
mobile radio
Reliability
Routing
Routing protocols
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
IoT environment
topological isolation
smoothing methods
low power and lossy network
IPv6 routing protocol over LLN
IPv6 over low power personal area network
Internet of things environment
high performance computing environment
forecasting
exponential window function
exponential smoothing time series data
exponential smoothing
blackhole attack detection approach
Blackhole attack
personal area networks
time series
IoT
blackhole attacks
telecommunication network topology
sensors
RFID
sink node
6LoWPAN
internet
Routing
Routing protocols
pubcrawl
Resiliency
Internet of Things
Scalability
IP networks
RPL
biblio
Extending Authentication Mechanism to Cooperate with Accountable Address Assignment
Submitted by grigby1 on Fri, 05/22/2020 - 1:13pm
IPv6
wireless networks
user authentication
Source Address Validation Improvement
security problems
SAVI
Resiliency
resilience
pubcrawl
Protocols
privacy
Portals
network accountability
Metrics
message authentication
main identity authentication mechanism
802.1X
IP source addresses
IP networks
IP addresses
internet
effective accountability mechanisms
DHCP request process
computer network security
composability
CAIP
authentication
accounting ability
Accountable IP address assignment
Accountable IP
accountable identity
accountable address assignment
biblio
Towards the formal verification of security properties of a Network-on-Chip router
Submitted by grigby1 on Fri, 05/15/2020 - 11:29am
IP networks
timing
security
Routing
NoC routing architectures
Network-on-Chip router
network-on-chip
network routing
MultiProcessors Systems-on-Chip
multiprocessing systems
model checking
pubcrawl
integrated circuit design
Hardware
formal verification
Cryptography
Metrics
resilience
Resiliency
Scalability
network on chip security
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 11:00am
internet
Web servers
security strategies
Scalability
robots
Resiliency
resilience
reconnaissance process
Reconnaissance
pubcrawl
Network reconnaissance
IP networks
Computer crime
honeytokens
file servers
delays
delay strategies
deceptive defense strategies
deceptive counter measure abilities
deception based information security
Databases
cyber threat landscape
computer network security
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 10:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
Measuring the Effectiveness of Network Deception
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
Network reconnaissance
uncertainty
target network
software-defined networking
software defined networking
SDN-based deception system
Scalability
Resiliency
resilience
reconnaissance surface
Reconnaissance
pubcrawl
network-based deception
network traffic
Bayes methods
Network Deception
measurement uncertainty
KL-divergence
IP networks
inference mechanisms
Government
cyber reconnaissance
cyber defensive system
cyber deception strategies
computer network security
Computer crime
belief system
Bayesian inference method
biblio
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
IPv6 DNS reconnaissance attacks
Servers
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
Network reconnaissance
naive brute forcing approach
IPv6 reconnaissance techniques
IPv6 network reconnaissance
brute force attacks
IPv6 addresses
IPv6
IPv4 address space
IP networks
internet
IDS
DNS Guard
DNS
computer network security
Computer crime
address scanning attacks
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »