Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Mitigating DDoS Flooding Attacks with Dynamic Path Identifiers in Wireless Network
Submitted by aekwall on Mon, 05/03/2021 - 12:11pm
DoS
Router Systems Security
Wireless Routing
Dynamic Path Identifiers (DPID)
AES algorithm
decryption
OTP
wireless networks
Predictive Metrics
Computer crime
Wireless communication
Communication system security
Routing
pubcrawl
Resiliency
encryption
Servers
IP networks
biblio
Network Fingerprinting: Routers under Attack
Submitted by aekwall on Mon, 05/03/2021 - 12:10pm
attack
connectivity
Ecosystems
Hardware
internet
IP networks
network fingerprinting
ping
Predictive Metrics
Probes
pubcrawl
Resiliency
Router Systems Security
security
Topology
Traceroute
biblio
A Systematic Way to Implement Private Tor Network with Trusted Middle Node
Submitted by grigby1 on Tue, 04/27/2021 - 1:15pm
Metrics
trustworthiness
Trusted Middle Node
trust
sockets
Servers
Resiliency
resilience
Random access memory
pubcrawl
Private Tor Network (PTN)
Physical Free Memory
Web Browser Security
Live Tor Network (LTN)
IP networks
Human behavior
Free CPU Time
Cryptography
CpuCount
CPU Percentage
Compositionality
Central Processing Unit
Browsers
Browser Security
biblio
A Three-Stage Machine Learning Network Security Solution for Public Entities
Submitted by aekwall on Tue, 04/27/2021 - 12:34pm
Portals
RegSOC
network protection
abuse-mailbox
abuse reports
SIEM
predictability
Security Heuristics
threat detection
social networking (online)
Monitoring
Communication networks
NLP
Cybersecurity
pubcrawl
Resiliency
real-time systems
security
Scalability
IP networks
biblio
A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Submitted by grigby1 on Fri, 04/09/2021 - 10:36am
RPL Routing
Peer-to-peer computing
pubcrawl
resilience
Resiliency
Routing
routing loops
Routing Protocol
Routing protocols
RPL performance
network reliability
RPL routing security scheme
security
sensor devices
sensor nodes
telecommunication network topology
wireless link
wireless sensor networks
WSN
IDS
Blackhole attack
composability
computer network security
count data
data packets
destination data delivery
exchange data routing
expected IDS
Black hole attackers
Internet of Things
IoT
IP networks
L-IDs
L-IDS procedure
LHV value
Link Hop Value-based Intrusion Detection System
network performance
biblio
An IDS Rule Redundancy Verification
Submitted by grigby1 on Fri, 04/09/2021 - 10:33am
Syntactics
Snort rule combinations
Snort community
public rulesets
open-source IDS system
network security software
IDS rule verification
IDS rule redundancy verification
commented rules
anomaly network traffics
Snort
IDS
resilience
tools
Semantics
Redundancy
Payloads
telecommunication traffic
composability
intrusion detection system
Protocols
computer network security
Resiliency
pubcrawl
IP networks
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 10:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
Adaptive Caching for Beneficial Content Distribution in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:31pm
in-network caching
utility-based replacement
request arrival rate
next-generation networking
network design
in-network caching mechanism
ICN interconnections
Future Internet (FI)
content-based providers
cache diversity
beneficial content distribution
beneficial caching scheme
adaptive caching mechanism
cache hit rate
content distribution
Information-Centric Networking (ICN)
IP networks
Information Centric Networks
information-centric networking
QoS
Proposals
quality of service
network topology
service providers
Economics
internet
pubcrawl
Resiliency
data traffic
security
telecommunication traffic
Scalability
biblio
An Information-centric NFV-based System Implementation for Disaster Management Services
Submitted by aekwall on Thu, 04/08/2021 - 3:29pm
mobile rescue operations
disaster recovery phase
flexible rescue group communication
ICN
information centric disaster management
information-centric disaster management system
information-centric network management
information-centric NFV-based system implementation
IP-based approach
low communication overhead
Disaster management
name-based interest-oriented communication approach
ndn nfv
network fragmentation
network infrastructure management
Seoul disaster management services
system implementation
Telephony
vICSNF
law enforcement
Scalability
virtualisation
computer network management
Resiliency
pubcrawl
internet
network topology
Topology
IP networks
Information Centric Networks
network function virtualization
container
hospitals
Gold
emergency management
openstack
connection-oriented communication
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
Histograms
uncertainty
telecommunication traffic
service attacks
security
Resiliency
resilience
pubcrawl
nonattack traffic
Metrics
IP networks
IP
Intrusion Detection
Internet technologies
internet
Anomaly Detection
graphics-based features
graph based features
fuzzy relevance function
Fuzzy logic
fuzzy clustering
Entropy
detection stage
DDoS intrusion detection approach
DDoS detection algorithm
DDoS detection
Cyber Physical System
computer network security
Computer crime
attack traffic
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »