Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture
biblio
Concerns regarding service authorization by IP address using eduroam
Submitted by BrandonB on Tue, 05/05/2015 - 8:41am
IP address
wireless LAN
visited institution
Service Level Agreement
service authorization
Servers
secure WLAN roaming service
secure Internet access
proxy servers
legal agreements
IP-Based
IP networks
authentication credentials
internet
IEEE Xplore
home networks
home institution
home credentials
firewalls
firewall
eduroam
authorization
authorisation
biblio
Delegation-based authentication and authorization for the IP-based Internet of Things
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
IP security protocols
Servers
Random access memory
public-key cryptography
public key cryptography
Protocols
peer authentication
memory-constrained devices
key agreement purposes
IP-based Internet of Things
authorization functionality
IP networks
Internet of Things
DTLS protocol
DTLS connection
delegation-based authentication
delegation server
Cryptographic Protocols
Context
biblio
The design of cybercrime spatial analysis system
Submitted by BrandonB on Mon, 05/04/2015 - 2:39pm
GIS data-structure
Spatial databases
spatial analysis system
Spatial analysis
security of data
Monitoring
IP tracking technology
IP networks
Internet searching
internet
Analytical models
GIS
geographic information systems
Data models
cybercrime prevention strategy
cybercrime monitoring design
Cybercrime
correlative analysis model
Computer crime
biblio
IPv4 Address Sharing Mechanism Classification and Tradeoff Analysis
Submitted by BrandonB on Mon, 05/04/2015 - 2:35pm
IPv4 address sharing
port usage efficiency
performance degradation
network address translation (NAT)
NAT444
ISP-level address sharing mechanisms
IPv6-only Internet
IPv6 transition
IPv6 deployment
IPv4 reachability
IPv4 address sharing mechanism classification
abuse attribution
IP networks
Internet service providers
internet
IANA-level IPv4 address exhaustion
DS-Lite
direct intercustomer communication
carrier grade NAT (CGN)
address plus port (A+P)
Address family translation
address efficiency
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
Design and implementation of a mobile VoIP system on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:37pm
Mobility
VoIP service
VoIP
true mid-call mobility
sockets
socket communications
smart phones
signaling procedure
Servers
Protocols
pre-call mobility
Peer-to-peer computing
peer entity
moving users
mobility management (mobile radio)
android
mobile VoIP system
mobile users
IP networks
Internet telephony
in band signaling
graphical user interfaces
encryption
DNS
Cryptography
buffering techniques
ASP technology
Androids
Android devices
Android (operating system)
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:19pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:51am
mobility management
WMN
wireless mesh networks
vehicular networks
telecommunication security
technological convergence
security
secure mobility scheme
packet delivery ratio
network access
negative effects
Monitoring
mobility management (mobile radio)
ARP packets flooding
Mobility
Mobile radio mobility management
MIRF
malicious ARP requests
IP networks
internet
infrastructure-based vehicular networks
handoffs
Floods
flooding attacks mitigation
Flooding Attacks
Filtering
biblio
Implementing IPsec in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:26pm
IEEE 802.15.4 networks
Zigbee
WSNs
wireless sensor networks
stand-alone wireless sensor networks
security threats
Payloads
IPv6 enabled sensor networks
IPsec authentication header
IP networks
Internet of Things paradigm
internet
6LoWPAN adaptation layer
IEEE 802.15 Standards
ESP compressed header performance
end-to-end communication path
encryption
encapsulation security payload
E2E security
Cryptography
computer network security
communication endpoints
authentication
AH
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
next ›
last »