Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
routers
biblio
Anomalies Detection of Routers Based on Multiple Information Learning
Submitted by
grigby1
on Mon, 11/04/2019 - 11:39am
Anomaly Detection
communication devices
Computer bugs
computer network security
Correlation
Diagnostics
feature extraction
input routers
internet
learning
learning (artificial intelligence)
Metrics
multiple information learning
privacy
pubcrawl
resilience
Resiliency
router anomalies detection
router security
router syslogs
router system
Router Systems Security
routers
security
security of data
Syslogs
telecommunication network routing
biblio
Protecting SDN controller with per-flow buffering inside OpenFlow switches
Submitted by
K_Hooper
on Wed, 05/09/2018 - 9:52am
buffer\_id feature
centralized controller
computer network security
control channel
control logic
control plane
control systems
data plane
denial of service
denial-of-service attacks
DoS attacks
DPDK
Floods
heavy control traffic conditions
individually buffered packets
IP networks
Monitoring
Open vSwitch
OpenFlow
OpenFlow protocol
OpenFlow switches
OpenFlow traffic
packet-in flood
per-flow buffering
process control
Protocols
pubcrawl
Resiliency
routers
Scalability
SDN controller
SDN security
Servers
software defined networking
standards-compliant protocol
statistical analysis
switch flow tables
switch memory
table-miss
telecommunication control
telecommunication network routing
telecommunication switching
telecommunication traffic
working principles
biblio
The organization of arrangements set to ensure enterprise IPV6 network secure work by modern switching equipment tools (using the example of a network attack on a default gateway)
Submitted by
K_Hooper
on Wed, 02/28/2018 - 10:38am
attacks
automated network SLAAC-configuration control
business communication
Cisco Packet Tracer 7 software emulator
collaboration
composability
computer network security
Computers
corporation enterprise networks
default enterprise gateway attacks
default gateway
enterprise information protection
enterprise IPV6 network security
enterprise network host protection algorithm
host
host protection algorithm
internet
Internet of Things
internetworking
IP network
IP networks
IPv6 network
ipv6 security
IPv6-network security
IPv6-protocol
Logic gates
Metrics
Network
network attack
network protection
network security
network switches
networks security
Organizations
Protocols
pubcrawl
Resiliency
routers
secure enterprise
security
Switches
switching equipment
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by
BrandonB
on Wed, 05/06/2015 - 9:41am
advanced metering infrastructure
AMI
Computer crime
computer network security
critical smart grid infrastructures
cyber attack
cyber attack impact
DDoS
distributed denial-of-service attacks
distribution system reliability
DoS
DoS-DDoS attacks
electrical distribution networks
grid topology
power distribution reliability
power engineering computing
power system security
qualitative assessment
Reliability
routers
Servers
simulation
Smart Grid
smart grid deployment
Smart Grids
smart meters
smart power grids
Topology
utility servers
biblio
Preserving the Anonymity in MobilityFirst networks
Submitted by
BrandonB
on Tue, 05/05/2015 - 8:55am
AMF
anonymity in MobilityFirst
anonymity preservation
authorisation
computer science
data privacy
future Internet architecture
global name resolution service
globally unique flat identifier
GNRS
GUID
internet
MF networks
mobile computing
MobilityFirst networks
privacy
privacy preservation
Public key
routers
Routing
Routing protocols
telecommunication network routing
telecommunication security
three-tiered approach
trust issues
Trusted Computing
user anonymity
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by
BrandonB
on Fri, 05/01/2015 - 6:39am
advanced metering infrastructure
AMI
Computer crime
computer network security
critical smart grid infrastructures
cyber attack
cyber attack impact
DDoS
distributed denial-of-service attacks
distribution system reliability
DoS
DoS-DDoS attacks
electrical distribution networks
grid topology
power distribution reliability
power engineering computing
power system security
qualitative assessment
Reliability
routers
Servers
simulation
Smart Grid
smart grid deployment
Smart Grids
smart meters
smart power grids
Topology
utility servers