Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Expert System for Assessing the Efficiency of Information Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
information security efficiency assessment
technical measures
security of data
security
resilience
pubcrawl
protected information
personal data
Organizations
organizational measures
organizational and administrative documents
Monitoring
IP networks
informed decisions
information system
Security Audits
information security audit
information security
information protection system
expert systems
expert system
expert assessment method
Data protection
coefficient of significance
authorities
auditing
audit information security
Scalability
Resiliency
Human behavior
biblio
Evolutionary Design of Hash Functions for IPv6 Network Flow Hashing
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
network flow
transport protocols
nondominated sorting genetic algorithm II
network monitoring probes
multiobjective evolutionary design method
linear genetic programming
IPv6 network flow hashing
IPv6 flow hashing
Internet Protocol
high-speed network systems
high-quality network flow hashing
genetic programming
Cartesian genetic programming
Monitoring
hash algorithms
Hash Function
evolutionary computation
Compositionality
Throughput
computer network
pubcrawl
Sorting
genetic algorithms
Resiliency
Task Analysis
IP networks
biblio
Game-Like Captchas for Intrusion Detection
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
Games
user interactions
user authentication
Support vector machines
pubcrawl
IP networks
intrusion detection system
Intrusion Detection
internet
Human behavior
Google re-captcha
authentication
game-like captchas
game play
game choices
credential stuffing
composability
captchas
biometrics (access control)
biometric authentication
authorisation
biblio
Evaluation of Network Assisted Handoffs in Heterogeneous Networks
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
pubcrawl
Metrics
mobile computing
mobility management (mobile radio)
multihoming
named-object
network assisted handoffs
ORBIT testbed
policy-based approach
LTE
Rebinding
resilience
Resiliency
seamless data transfer
soft handoff
Throughput
WiFi
hard handoff
5G mobile communication
beyond 5G networks
clean slate
collaboration
computer architecture
Distributed Mobility Management
DMM
Handover
5G
heterogeneous networks
Human behavior
ICN
information centric network architecture
internet
IP network
IP networks
biblio
Managing the Evolution to Future Internet Architectures and Seamless Interoperation
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
network management perspective
interoperability
IoT
IP networks
Logic gates
Metrics
MobilityFirst
NDN
network architecture
internetworking
network servers
open systems
policy-based approach
Protocols
pubcrawl
resilience
Resiliency
seamless interoperation
encryption
architectural island separation
clean slate
COIN
collaboration
computer architecture
computer network management
content retrieval
content-oriented interoperability framework
application-layer object resolution service
Future Internet Architectures
Human behavior
ICN
industrial automation
information-centric networking
information-centric networks
internet
Internet architectures
biblio
ConForm: In-band Control Plane Formation Protocol to SDN-Based Networks
Submitted by grigby1 on Tue, 03/16/2021 - 2:10pm
SDN-based networks
OpenFlow-based SDN networks
optical switches
policy-based approach
protocol design
Protocols
pubcrawl
resilience
Resiliency
network topology discovery
security
Self-establishment
software defined networking
TCPIP
telecommunication network topology
telecommunication traffic
Topology
transport protocols
In-Band Control Plane
bootstrap protocol
clean slate
clean slate architectures
collaboration
computer network management
data plane
Formal Specification
Human behavior
Bootstrap
In-band Control Plane Formation Protocol
inband control plane
IP networks
management plane activities
management plane related activities
Metrics
network startup
network topology
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
Routing protocols
network operation
peer connections
Peer-to-peer computing
peering decision
peering dynamics
prefix hijacking attack
propagation delays
pubcrawl
public Bitcoin
Reliability
network adversary
routing-level attacks
security
sophisticated attack strategies
stealthier partitioning attack
targeted Bitcoin node
telecommunication network routing
telecommunication network topology
telecommunication traffic
time 5.0 week to 6.0 week
Bitcoin network
Scalability
Resiliency
Metrics
Human Factors
abundant network address resources
ASes
attack execution period
attack traffic rate
bitcoin
Bitcoin core
peer to peer security
Bitcoin peer-to-peer network
centralization problem
computer network security
eclipse attack
EREBUS attack
Human behavior
IP networks
Monitoring
natural man-in-the-middle network
biblio
P4NIS: Improving network immunity against eavesdropping with programmable data planes
Submitted by grigby1 on Tue, 03/09/2021 - 2:40pm
Servers
P4NIS
packet classification
performance evaluation
policy-based governance
programmable data planes
programming protocol-independent packet processor based network immune scheme
Protocols
pubcrawl
network paths
single network path
supercomputer computational capacity
telecommunication traffic
three lines of defense
traffic packets
transmission port field encryption
versatile attackers
encryption-based countermeasures
brute-force attacks
computer network security
Cryptography
diverse encryption algorithms
eavesdropping
eavesdropping attacks
encrypted packet transmission
encryption
brute force attacks
Human behavior
Human Factors
internet
Internet Protocol
IP
IP networks
network immunity
biblio
Design and Implementation of NIDS Notification System Using WhatsApp and Telegram
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
notification platform
whatsapp
Telegram
telecommunication traffic
SYN flood attacks
SSH brute force attacks
social networking (online)
Social network services
Snort
Servers
security of data
real-time systems
pubcrawl
policy-based governance
packet data traffic
administrator
Notification
NIDS notification System
NIDS
network intrusion detection system
IP networks
Intrusion Detection
Human Factors
Human behavior
Force
Floods
Death attacks
brute force attacks
attack time
attack port
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »