Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
A Learning Kit on IPv6 Deployment and Its Security Challenges for Neophytes
Submitted by grigby1 on Tue, 01/21/2020 - 11:09am
Personnel
Training
tools
Software
self-learning
security model
security challenges
security
Resiliency
resilience
pubcrawl
Protocols
pre-alpha testing
policy-based governance
collaboration
Organizations
network security
neophytes
neophyte
Metrics
learning kit
IT personnel
ipv6 security
IPv6 environment
IPv6 deployment
IP networks
computer network security
composability
biblio
A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
IPv6 source address
telecommunication network management
Switches
source address authentication
software defined networking
Software Defined Network
Servers
SDN
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network addresses
Metrics
message authentication
access network
ipv6 security
IPv6 protocol
IP networks
Internet-connected devices
internet
hierarchical authentication mechanism
fine-grained security protection
encryption authentication
Cryptography
computer network security
computer architecture
composability
collaboration
authentication
biblio
SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
SDN switch
network security
normal forwarding method
policy-based governance
Protocols
pubcrawl
resilience
Resiliency
SDN controller
network attacks
SDN-Ti prototype
Servers
Software Defined Network
software defined networking
stateless address autoconfiguration protocol
Switches
telecommunication traffic
trusted ID-encoded address
IPv6 address assignment scenarios
attacker traceback
authentication
collaboration
composability
computer network security
Cryptography
internet
IP networks
attack incident
IPv6 addresses
IPv6 networks
ipv6 security
IPv6 testbed
Metrics
network accountability
network administrator
biblio
Analytical Study on Mobile Ad Hoc Networks for IPV6
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
Mobile impromptu systems
wireless gadget connections
Wireless communication
transport protocols
telecommunication traffic
Technological innovation
TCP-IP
steering conventions
self arranging system
Resiliency
resilience
pubcrawl
protocol
policy-based governance
pervasive computing
Base stations
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
IPV6 systems
ipv6 security
IPv6 MANET
IPv4 MANET
IP networks
Handheld computers
computer network security
composability
Communication system security
collaboration
biblio
Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch
Submitted by grigby1 on Tue, 01/21/2020 - 11:08am
large-scale modifications
unsatisfactory deployability
Resiliency
resilience
Receivers
pubcrawl
Protocols
private proposal
privacy
policy-based governance
Payloads
PAVI prototype
Observers
network accountability
Metrics
accountability
ipv6 security
IPv6 Internet
IPv6
IP networks
internet
data privacy
computer network security
composability
communication identifiers
collaboration
bootstrapping privacy
bootstrapping accountability
authentication
accountable proposal
biblio
Research on the IPv6 Technical Defects and Countermeasures
Submitted by grigby1 on Tue, 01/21/2020 - 11:07am
ipv6 security
transport protocols
TCP/IP protocol cluster
Spliced Address
security
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network topology
Metrics
IPv6 technical defects
IPv6 spliced address
Big Data
IPv6 interface ID
IPv6 address structure design ideas
IPv6
IPv4 Upgrading
IPv4
IP networks
internet
Interface ID
global Internet
composability
collaboration
cloud storage
Cloud Computing
biblio
Hybrid SDN-ICN Architecture Design for the Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 10:27am
running technologies
network techniques
OpenFlow
operational plane
privacy aware-IoT architecture
Protocols
pubcrawl
Publish/Subscribe
resilience
Resiliency
Routing
NBI
Scalability
SDN
SDN enhancement
smart ICN data plane
Software
Software Defined Network paradigms
software defined networking
strategic plane
tactical plane
hybrid SDN-ICN architecture design
cache storage
Cloud Computing
computer architecture
control local clusters
data privacy
edge environment
Edge/Fog Computing
environment measurements
EWBI
architecture controlling functionalities
ICN
in-network caching
Information Centric Network
Information Centric Networks
Internet of Things
IoT
IP networks
Monitoring
multiple planes
biblio
NSTN: Name-Based Smart Tracking for Network Status in Information-Centric Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 10:26am
network operators
traditional network supervision method
traditional management information base
tracking method
status request
status data
Scalability
Resiliency
resilience
required network status information
pubcrawl
Protocols
Next generation networking
next generation network
network state information
adaptive network data location replacement strategy
network conditions
name-based smart tracking system
Management information base
IP networks
Internet of Things
information-centric internet of things
information volume
information technology
Information Centric Networks
Information Centric Network
IC-IoT
defined data tracking table
computer network management
biblio
A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking
Submitted by grigby1 on Tue, 01/21/2020 - 10:26am
Information Centric Networks
telecommunication network routing
security
Scalability
Resiliency
resilience
pubcrawl
network congestion
NDN router
named data networking
IP networks
internet
interest flooding attacks
information-centric networking architectures
ICN architectures
Information Centric Network
computer architecture
computer network security
computer science
congestion-aware IFA attack detection
congestion-aware interest flooding attacks detection mechanism
data requests
Data Security
delays
Denial of Service attacks
DoS attacks
Floods
future Internet architecture
biblio
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
Intrusion Detection Systems
blockchain
blockchain architectures
CIDN peers
collaboration
collaborative IDS nodes
collaborative intrusion detection
collaborative intrusion detection networks
Cryptography
Distributed databases
distributed ledger technologies
Human behavior
insider attacks
insider threat
Insider Threats
Intrusion Detection
Trusted Computing
IP networks
Metrics
Monitoring
Peer-to-peer computing
policy-based governance
pubcrawl
resilience
Resiliency
security
tampered-resistant trust-chain
Trust management
trust management issues
trust-based blockchain
trust-based collaborative intrusion detection
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »