Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
Resiliency
virtual ports
virtual port numbers
virtual IPs
virtual IP addresses
Synchronization
Static Network
Software-Defined Networks
software-defined networking-based MTD technique
software defined networking
Servers
scanning attacks
Scalability
RHSM
attack success probability
resilience
Reconnaissance
random IP addresses
random host and service multiplexing technique
pubcrawl
proactive defense mechanism
Network reconnaissance
Multiplexing
MTD technique
IP networks
control systems
computer network security
biblio
Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network
Submitted by grigby1 on Fri, 05/15/2020 - 10:35am
optimized configuration
threat model presumes
subnets
Statistics
Software Defined Networks
software defined networking
Software Defined Network
Software
Sociology
Scalability
Resiliency
resilience
reconnaissance scans
Reconnaissance
pubcrawl
Artificial Intelligence
NMAP ping scans
Network reconnaissance
Network Deception
IP networks
IP addresses
honeypots
high performing static defenses
genetic algorithms
Generators
evading detection
deceptive network view
computer network security
coevolutionary genetic algorithm
coevolution
biblio
A Flow-Level Architecture for Balancing Accountability and Privacy
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
privacy
self-certifying identifier
Performance analysis
network flows
multidelegate mechanism
Internet service provider
flow-level architecture
delegate-registry cooperation scheme
accountability
network accountability
internet
Metrics
computer network security
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
security
Receivers
data privacy
IP networks
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 10:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
Enhancement of Moodle learning Management System Regarding Quizzes Security and Stability Problems
Submitted by grigby1 on Fri, 05/08/2020 - 1:19pm
object oriented security
upgraded tool
tools
sudden short disconnection
stability problems
security performance
security of data
security
Resiliency
resilience
quizzes stability
quizzes security
quiz tool features
pubcrawl
online exams
composability
Moodle system environment
Moodle quiz tool
Moodle learning management system
Moodle (Modular Object Oriented Dynamic Learning Environment)
Metrics
Learning management systems
IP networks
information filtering
experimental test Moodle site
enhancement aspects
eLMS (Electronic Learning Management Systems)
Electronic learning
E-Quiz
biblio
A Dynamic Cybersecurity Protection Method based on Software-defined Networking for Industrial Control Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
moving target defense
software-defined networking
software defined networking
Software Defined Network
security response measures
security of data
SDN
Resiliency
real-time systems
Real-time intrusion detection
pubcrawl
protection requirement analysis
Predictive Metrics
Networked Control Systems Security
closed-loop security control
IP networks
Intrusion Detection
Industrial Control Systems
industrial control system
industrial control
Anomaly Detection
ICs
dynamic cybersecurity protection method
cybersecurity protection
control systems
control engineering computing
computer security
composability
biblio
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection
Submitted by aekwall on Mon, 05/04/2020 - 10:15am
deep learning
networked system
network security practices
network attack detection technology
network attack detection tasks
network attack detection
Graph Kernel
flow-based network attack detection
deep learning architecture
anomaly-based approaches
Network Security Architecture
deep neural networks
Computer crime
network traffic
convolutional neural nets
Neural networks
graph theory
pubcrawl
Resiliency
learning (artificial intelligence)
computer architecture
Kernel
IP networks
computer network security
biblio
A Programmable Network Management Architecture for Address Driven Network
Submitted by aekwall on Mon, 05/04/2020 - 10:06am
network management
YANG
REST APIs
programmable network management architecture
network protocols
network management functions
NETCONF
innovative network architecture
flexible management
Configuration Management
address driven network
Network Security Architecture
network services
computer network security
application program interfaces
Load modeling
Routing
pubcrawl
Resiliency
network security
Data models
computer network management
Protocols
security
IP networks
biblio
Performance Evaluation for Secure Internet Group Management Protocol and Group Security Association Management Protocol
Submitted by grigby1 on Fri, 04/24/2020 - 3:21pm
multicast communication
Unicast
telecommunication security
security
secure Internet Group Management Protocol
Resiliency
resilience
pubcrawl
Protocols
object oriented security
Object oriented modeling
multicast protocols
multicast distribution
authorisation
Metrics
media streaming
IPTV
IP networks
IP multicast technology
Internet service providers
Internet protocol television
internet
Group Security Association Management Protocol
data delivery
composability
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »