Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
"Routing in the Centralized Identifier Network"
Submitted by grigby1 on Tue, 02/21/2017 - 11:57am
IP networks
telecommunication network routing
telecommunication links
tailor-made router
software defined networking
Software Defined Network
scaling problems
Routing protocols
Routing
router link states gathering
pubcrawl170103
packet forwarding
network functions resplitting
network flexibility
network adaptability
Aerospace electronics
internet
identifier/locator separation
identifier-locator separation
host mobility
globally unique ID
Databases
controller cluster design
control plane/forwarding plane separation
control plane-forwarding plane separation
computer architecture
clean-slate network architecture
CIN routing
centralized identifier network routing
biblio
"FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics"
Submitted by abfox on Tue, 02/14/2017 - 1:28pm
highly scalable distributed feature collection and correlation engine analysis engine
time windows
security of data
security intelligence
security analytics
real-time systems
query processing
pubcrawl170101
production network query
low latency query responses
low latency Big Data analytics
IP networks
advanced persistent threat infection detection
geographically distributed large data sets
fluxing domain name detection
Feature Selection
feature extraction
FCCE
Distributed databases
Data mining
cyber security domain
Correlation
computer security
Big Data
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 1:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
biblio
"Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation"
Submitted by abfox on Tue, 02/14/2017 - 12:44pm
malware
virtual networks
pubcrawl170101
Protocols
Ports (Computers)
penetration and exploration phase
path control
OpenFlow technology
OpenFlow
network security
mission execution phase
malware responding system
malware detection system
malware communication
advanced persistent threat attacks
IP networks
invasive software
intrusion detection system
initial compromise phase
entry control measures
Dynamic Responding
Digital Forensics
Databases
computer security
computer network security
attacking infrastructure building phase
APT attacks
biblio
"Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data"
Submitted by abfox on Tue, 02/14/2017 - 12:41pm
internet
Web proxy logs
system-on-chip
Servers
security products
pubcrawl170101
malware strains
malware
Los Alamos National Lab
large-scale log data mining
LANL
IP networks
invasive software
advanced persistent threat
graph theory
Electronic mail
early-stage enterprise infection detection
early-stage APT infection
DNS logs
Data mining
data analysis
business data processing
belief propagation
belief networks
APT infection attacks
advanced persistent threats
biblio
"Persistent threat pattern discovery"
Submitted by abfox on Tue, 02/14/2017 - 12:36pm
Government
security of data
pubcrawl170101
persistent threat pattern discovery
persistent threat identification
Persistent Threat (PT)
network data
IP networks
Intrusion Detection Systems
Intrusion Detection
advanced persistent threat
frequent pattern discovery
Data mining
cyber-attack
association rules
Association Rule Mining (ARM)
association rule mining
arm
APT
Advanced Persistent Threat (APT)
biblio
Verification of DNSsec Delegation Signatures
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
interactive theorem prover
Theorem Proving
Servers
security protocol verification
Public key
Protocols
model checking analysis
Isabelle/HOL
Isabelle-HOL
IP networks
internet
authentication
inference mechanisms
inductive approach
formal verification
DNSsec protocol
DNSsec delegation signatures
DNSsec
delegation signatures
Cryptographic Protocols
chain of trust
biblio
Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
IP-based wireless sensor networks
WSNs
wireless sensor networks
wireless sensor key exchange protocol
Wireless communication
security
Protocols
lightweight key exchange protocol WSKE
IPSEC-6LoWPAN networks
IPsec
authentication
IP networks
Internet key exchange version 2 mechanism
internet
IKEv2
formal verification
end-to-end security
Cryptographic Protocols
Communication system security
AVISPA
biblio
Behavioral analytics for inferring large-scale orchestrated probing events
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
Internet traffic
telecommunication traffic
statistical techniques
statistical analysis
signal techniques
routable unallocated IP addresses
Probes
orchestration pattern
network security analysts
malware traffic
malware
malicious real darknet data
malicious activities
large-scale orchestrated probing events
IP networks
invasive software
computer network security
internet
information theory
information theoretical metrics
fuzzy set theory
fuzzy approaches
emergency response teams
early cyber attack warning
early cyber attack notification
data mining methods
Data mining
Cyberspace
cyber threat intelligence
cyber attack
coordination pattern
Conferences
biblio
A temporal packet marking detection scheme against MIRA attack in MANET
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
packet marking
Topology
time behavior
Throughput
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing
resource constraint
physical security
packet transmission
packet radio networks
packet marking detection scheme
clustering
mobile ad-hoc network
mobile ad hoc networks
Misleading routing attack (MIRA)
misleading routing attack
MIRA attack
MANET
malicious nodes detection
IP networks
energy constraint operations
dynamic topology
delays
delay packet
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
next ›
last »