Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
resilience
biblio
Identification and Assessment of Risks Affecting Sociotechnical Systems Resilience
Submitted by aekwall on Mon, 03/01/2021 - 3:49pm
Scalability
Resiliency
pubcrawl
Robustness
Decision Making
risk management
Economics
risk assessment
Capacity planning
Planning
Measurement
resilience
Resilience Metrics
resilience planning
5×5 matrix
identifying assessing risk factors
resilience engineering
Resiliencebased risk matrix
risk Identification
sociotechnical systems resilience
work factor metrics
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
Access Control
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
control systems
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
resilience
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
security
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
ARP Spoofing
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity experiments
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
network classification model
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
reconnaissance attack
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
anomaly based IDS
computer network security
discretization
Entropy
entropy based discretization technique
feature extraction
Hidden Markov models
IDS systems
Intrusion Detection
intrusion detection system
machine learning
network attack
network intrusion detection system
network packets
Network reconnaissance
networking technologies
principal component analysis
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Training
Training data
biblio
Combating TCP Port Scan Attacks Using Sequential Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
attack reconnaissance tool
classification
Communication networks
complex TCP classes
computer network security
general packetized traffic
learning (artificial intelligence)
Network reconnaissance
neural nets
Neural networks
NMAP scan pcap files
port scans
pubcrawl
resilience
Resiliency
Scalability
sequential neural networks
TCP datagrams
TCP packet
TCP port scan attacks
telecommunication traffic
transport protocols
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
collision probability
concurrency control
Cryptographic Protocols
cryptographically secure random values
Cryptography
Databases
decentralized identifier distribution
IP networks
moving target defense
network entity identifiers
Network Identification
Network reconnaissance
network security
network security objectives
proactive defense
protocol
Protocols
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
synchronisation
Synchronization
timestamp-based concurrency control algorithms
Twitter
unique universal identifiers
biblio
Characterising Network-Connected Devices Using Affiliation Graphs
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
affiliation graphs
computer network management
device discovery and management
encryption-invariant device management strategy
future traffic demand
graph theory
internet
IP networks
Local area networks
management complexity
network administrators
Network reconnaissance
network-connected devices
passive network reconnaissance
pubcrawl
resilience
Resiliency
Scalability
security analysts
security risk
university campus network
biblio
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
Cloud Computing
Computer crime
control systems
denial-of-service attack
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Servers
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
adversarial reconnaissance
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
data privacy
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
Network reconnaissance
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
security of data
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
computer network management
distributed firewall application
firewalls
Firewalls (computing)
global network overview
Mininet
network architecture
network logic
Network reconnaissance
network topology
OpenFlow counters
pubcrawl
Reconnaissance
reconnaissance attack
resilience
Resiliency
Scalability
SDN architecture
SDN based environments
SDN controller
SDN-based solution
security policy
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Telecommunications
testing
1
2
3
4
5
6
7
8
9
…
next ›
last »