Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
biblio
Multiple OS rotational environment an implemented Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:17am
moving target defense
testing
Servers
security of data
security
operating systems (computers)
operating systems
Nmap
multiple OS rotational environment
MTD technique
Availability
manual penetration test
IP networks
insert
Fingerprint recognition
defensive strategies
cyber-attacks mitigation
CORE Impact Pro
CORE
biblio
Scaling IPv6 address bindings in support of a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:14am
moving target defense
UDP requests
UDP echo server
transport protocols
Time factors
statistical improbability
standards
sockets
Servers
security
reconnaissance phase
Peer-to-peer computing
peer to peer scenario
networking
network security research
MT6D
bound interfaces
malicious actor
Local area networks
Kernel
IPv6 moving target defense
IPv6 address space
IPv6 address bindings
IPv6
IP networks
internet
Ethernet interface
computer network security
client-server systems
client server ratio
client server networks
biblio
Analysis of network address shuffling as a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:13am
Computational modeling
Computers
Information systems
IP networks
moving target defense
network address remapping
network address shuffling
probabilistic models
probability
Probes
Reconnaissance
security of data
biblio
Datacenter Applications in Virtualized Networks: A Cross-Layer Performance Study
Submitted by BrandonB on Tue, 05/05/2015 - 10:23am
network virtualization
virtualized networks
Virtualization
virtualisation
software-defined networking
software radio
software defined networking overlays
Servers
Protocols
overlay networks
overlay network
Cloud Computing
IP networks
Hardware
Encapsulation
delays
datacenter workloads
datacenter networks
datacenter applications
cross layer performance study
cross layer hybrid mesoscale simulation platform
computer centres
biblio
Challenges with Transition and User Accounting in Next Generation Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:58am
Hardware
internet
IP networks
IPv4
IPv6
Monitoring
network administrators
network control protocol
next generation networks
Organizations
Probes
Protocols
recursive inter network architecture
TCP/IP
user accounting
biblio
On the performance of the LISP beta network
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
internetworking
USA site
Routing protocols
Routing
median mapping resolution delay
locator-identifier separation protocol
LISP interworking infrastructure
LISP Beta Network reliable performance
IP networks
IP address
interworking mechanism
BGP churn reduction
internet
European infrastructure
Europe
delays
Databases
control plane
computer network reliability
BGP table size reduction
BGP routing policy
biblio
Flow-based conflict detection in OpenFlow networks using first-order logic
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
Internet architecture
unreachable flows
transport protocols
Proposals
OpenFlow network architecture
OpenFlow controller
network elements
network devices
Media Access Protocol
management plane
knowledge based systems
IP networks
centralization architecture
inference mechanisms
inference engine
Indexes
flow-based conflict detection
first-order logic
control systems
control plane
computer network management
Clean Slate initiative
centralized controller
biblio
A unified approach to network anomaly detection
Submitted by BrandonB on Tue, 05/05/2015 - 9:32am
Big Data
Computer crime
computer network security
continuous-valued data
Correlation
hidden Markov model
Hidden Markov models
HMM
IP networks
Kalman filters
LDS
linear dynamical system
network anomaly detection
network traffic
Ports (Computers)
Robustness
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
next ›
last »