Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
network traffic
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
ARP Spoofing
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity experiments
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
network classification model
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
reconnaissance attack
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
biblio
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 12:35pm
Scalability
telecommunication traffic
Resiliency
Human behavior
pubcrawl
simulation
Computational modeling
convergence
internet
trees (mathematics)
network traffic
delays
telecommunication network topology
network performance
named data networking
computer science
information-centric networking
cache storage
Time complexity
in-network caching
named data network
Abilene network topologies
Cache Replacement Strategy
caching algorithms
caching strategy
computer network
content replacement scheme
ICN primary features
Internet requirements
Randomized LFU
Tree network topologies
biblio
A Dynamic Analysis Security Testing Infrastructure for Internet of Things
Submitted by grigby1 on Tue, 02/16/2021 - 11:46am
Internet of Things
security
data analysis
Monitoring
IoT
pubcrawl
Metrics
resilience
Resiliency
computer network security
IoT devices
data privacy
telecommunication traffic
composability
network traffic
Reliability
security controls
testing
Google
dynamic analysis
Amazon Echo
security testing
Amazon devices
dynamic analysis security testing infrastructure
Google devices
Google Home
live traffic monitoring
offline data analysis
software analysis
dynamic networks
biblio
Performance Evaluation of Data Center Network with Network Micro-segmentation
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
security
pubcrawl
Metrics
resilience
Resiliency
computer network security
performance evaluation
Data models
Cloud Computing
Topology
telecommunication traffic
composability
network traffic
software defined networking
software-defined networking
network topology
computer centres
search engines
cloud-based applications
telecommunication network topology
social networks
data centers
computer network performance evaluation
data center infrastructure
Cisco Application Centric Infrastructure
data center network
data center network performance
dynamic data center
high-performance requirements
micro-segmentation
network microsegmentation
performance evaluation results
security idea
zero trust security
zero trust security model
dynamic networks
biblio
A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
Submitted by grigby1 on Wed, 02/10/2021 - 11:50am
security of data
time series
pubcrawl
resilience
Resiliency
Scalability
network traffic
telecommunication traffic
telecommunication channels
Compositionality
chaos
Robustness
covert channels
channel identifier
chaos theory
high-dimensional phase space
inter-packet delay
NCTC detection method
network covert timing channel
network covert timing channel detection method
one-dimensional time series
secret reconstruction strategy
security concern
stable channel traits
Threshold secret sharing
traditional security policies
unique channel traits
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Inspection
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
Software-Defined Networks
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
deep packet inspection approaches
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
biblio
Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
Submitted by aekwall on Mon, 01/11/2021 - 12:35pm
computer network security
deep packet inspection
deep packet inspection system
dpi
DPI software system
Hurst flow parameter
Hurst parameter
information protocol.
Internet of Things
Intrusion Detection
IoT
IoT traffic
network attacks
network provider
network security
network traffic
network traffic analysis
pubcrawl
Resiliency
Scalability
telecommunication traffic
biblio
Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
Submitted by grigby1 on Tue, 12/01/2020 - 12:47pm
Bayes methods
Bayesian network
belief networks
binary classification
CICIDS2017 network intrusion dataset
class distribution parameters
composability
detection rate
dimensionality reduction
feature dimensionality reduction approach
feature extraction
high-dimensional features
IDS
imbalanced class distributions
imbalanced data
imbalanced distribution
intrusion detection system
IP networks
learning (artificial intelligence)
low-dimensional features
machine learning
Measurement
minority class instances
multiclass classification show
multiclass combined performance metric
network intrusion detection system
network traffic
PCA
PCA-based dimensionality reduction
principal component analysis
pubcrawl
resilience
Resiliency
security of data
Support vector machines
biblio
Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:53am
Monitoring
data privacy
Resiliency
Human behavior
pubcrawl
wireless sensor networks
privacy
Routing
Metrics
network traffic
Routing protocols
computer science
Compositionality
WSN
Position measurement
context privacy
Global Adversary
location privacy protection
resource-constrained sensor nodes
source location privacy
Location Privacy in Wireless Networks
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 12:41pm
acute attacks
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
external network traffic
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
light-weight traffic visualization system
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
pubcrawl
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
1
2
3
4
5
6
7
8
next ›
last »