Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Scalable Packet Classification for Datacenter Networks
Submitted by BrandonB on Wed, 05/06/2015 - 11:58am
IP networks
VLANs
VLAN
virtual machines
telecommunication network routing
storage penalty
Software
Scalability
router architectures
packet forwarding
packet classification
Local area networks
length combinations
classification rules
Indexes
hash table
hardware parallelism
Hardware
firewalls
encoding
encoded rule expansion
Decision trees
datacenter networks
datacenter network
data structures
computer centres
biblio
On Adding Bloom Filters to Longest Prefix Matching Algorithms
Submitted by BrandonB on Wed, 05/06/2015 - 11:52am
Routing
longest prefix matching
Memory management
multihashing
parallel multiple-hashing algorithm
parallel-multiple hashing algorithm
performance evaluation
PMH algorithm
prefix matching algorithms
router
level algorithm
Routing protocols
SRAM
SRAM chips
static random access memory
System-on-a-chip
TCAM technology
ternary content addressable memory technology
wire-speed packet forwarding
Generators
binary search on levels
Bloom filter
Bloom filters
data structures
DRAM
DRAM chips
dynamic random access memory
fast parallel matching
binary search
hardware architectures
Indexes
internet
Internet Protocol
Internet routers
IP address lookup
IP networks
leaf pushing
biblio
SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
ISP
VoIP service
unique sequence signatures
transport protocols
telecommunication traffic
SkyTracer
Skype UDP flow
Skype
Sequence Signature
Protocols
Payloads
optimisation
network performance optimization
Accuracy
IP networks
Internet telephony
internet
information security
host level identification
Flow-level Identification
fine grained Skype traffic identification accuracy
Educational institutions
digital signatures
Correlation-based Approach
computer network performance evaluation
Complexity theory
biblio
Fingerprinting Internet DNS Amplification DDoS Activities
Submitted by BrandonB on Wed, 05/06/2015 - 10:40am
geolocation
storage capacity 720 Gbit
sensors
packet size
network-layer
Monitoring
IP networks
Internet-scale DNS amplification DDoS attacks
internet
Grippers
anti-spam organizations
fingerprinting Internet DNS amplification DDoS activities
distributed denial of service
detection period
darknet space
cyber security intelligence
computer network security
Computer crime
backscattered analysis
attack duration
biblio
IP Spoofing Detection Using Modified Hop Count
Submitted by BrandonB on Wed, 05/06/2015 - 10:39am
IP address spoofing utilization
testing
statistical analysis
Routing protocols
modified hop count parameter
IP spoofing detection
IP spoofing attacks
IP spoofing
IP networks
Computer crime
internet
hop count filtering technique
hop count filtering
Hop Count
HCF learning phase
Filtering
computer network security
biblio
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks
Submitted by BrandonB on Wed, 05/06/2015 - 10:34am
large-scale network
statistical analysis
spamming
Servers
Protocols
Ports (Computers)
Phishing
passive monitoring
network measurement
malicious activities
load balancers
large-scale networks
botnets
IP networks
Internet Protocol
internet
Electronic mail
Educational institutions
domain name system
DNS-based security approaches
DNS
Databases
content delivery networks
computer network security
biblio
Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers
Submitted by BrandonB on Wed, 05/06/2015 - 10:24am
HTTP protocol
transport protocols
traffic IP-flow analysis
telecommunication traffic
Softflowd
Protocols
Payloads
NetFlow
naive Bayes algorithm
machine learning based analysis
machine learning approach
machine learning algorithms
learning (artificial intelligence)
IP networks
IP flows
hypermedia
Bayes methods
HTTP filters
flow-based network traffic
feature extraction
destructive threats
Decision trees
cyber security
computer network security
Complexity theory
command and communication protocol
Classification algorithms
C4.5 learning algorithm based classifier
C&C protocol
Botnet detection
botnet behaviour analysis
biblio
Analysis of a #x201c;/0 #x201d; Stealth Scan From a Botnet
Submitted by BrandonB on Wed, 05/06/2015 - 10:22am
animation
botnet
Communication system security
darknet
Geology
internet
Internet background radiation
Internet telephony
IP networks
network probing
Network Telescope
Ports (Computers)
scanning
Servers
Telescopes
VoIP
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 10:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
biblio
Programmable management framework for evolved SDN
Submitted by BrandonB on Wed, 05/06/2015 - 9:56am
OSGI
telecommunication network management
software-defined networking
software radio
Software
security
SDN philosophy
SDN networks
SDN manager
SDN architecture
SDN
Protocols
programmable management framework
PDEE
autonomic network management
on-the-fly code update
network management
management functions
IP networks
Hardware
FIPA
evolved SDN
distributed execution environment
control systems
computer architecture
codes
code lifecycle management
bottom-up approach
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
next ›
last »