Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
p2p
biblio
A Two-stage P2P Botnet Detection Method Based on Statistical Features
Submitted by grigby1 on Tue, 03/09/2021 - 2:25pm
benign P2P hosts
botnet
botnets
composability
computer network security
detection
feature extraction
invasive software
machine learning
Metrics
Monitoring
network security
p2p
Payloads
Peer-to-peer computing
pubcrawl
real-time systems
resilience
Resiliency
software engineering
statistical analysis
statistical feature
telecommunication traffic
traffic statistical features
two-stage P2P botnet detection method
unsolicited e-mail
biblio
A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs)
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
telecommunication security
Resiliency
pubcrawl
p2p
Peer-to-peer computing
Metrics
telecommunication network routing
MANET
mobile ad hoc networks
telecommunication network topology
Scalability
Human Factors
mobile devices
DHT
dedicated servers
deployment
deployment solution
dynamic topology changes
flat logical overlay
hierarchical MANETs
hierarchical mobile ad hoc networks
Hierarchical Networks
hierarchical underlay
mobility scenarios
OMNET++
specific performance challenges
specific routing roles
Structured Overlay
tactical networks
topology-awareness
underlay mismatch
underlay topology
wireless networks
peer to peer security
biblio
BitTrusty: A BitCoin Incentivized Peer-to-Peer File Sharing System
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
bitcoin
BitTorrent
BitTorrent platform
blockchain
collaborative distributed platform
composability
computer network security
Conferences
distributed systems
file sharing network
Free riding
free-riders
History
honest peers
Human behavior
Human Factors
incentives
Metrics
p2p
P2P cryptocurrency networks
P2P file sharing systems
P2P network
Peer-to-peer computing
peer-to-peer file
penal actions
pubcrawl
resilience
Resiliency
Secure File Sharing
Trusted Computing
User behavior
white-washers
biblio
Reputation-Based Security System For Edge Computing
Submitted by grigby1 on Mon, 07/01/2019 - 10:06am
composability
Compositionality
Computing Theory and Trust
mobile edge-clouds
p2p
pubcrawl
reputation
resilience
Resiliency
Scalability
Security Heuristics
trust
biblio
Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns
Submitted by grigby1 on Fri, 04/05/2019 - 10:25am
peer to peer security
botnets
Compositionality
graphlet
machine learning
Metrics
Mobile Botnet
p2p
PCA
pubcrawl
resilience
Resiliency
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer to peer security
component
composability
computer network security
data availability
Licenses
logically connected hosts
malicious data
Metrics
overlay networks
p2p
peer
Peer-to-peer computing
peer-to-peer network overlays
peer–
proactive
pubcrawl
radio frequency allocation incensing
resource management
Servers
simulation
Social network services
Sybil attack
sybil attacks
sybil defense scheme
sybil nodes
to–
trusted nodes
biblio
Mobile powered sub-group detection/formation using taste-based collaborative filtering technique
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
Collabarative Filtering
collaborative filtering
Compositionality
computer science
debate discussion forum
explicit attitude
Global Positioning System
implicit attitude
MANET
Metrics
Mobile communication
mobile computing
Mobile powered sub-group detection/formation
p2p
privacy
pubcrawl
resilience
Resiliency
sensors
social media discussion data
Social Mediadata
Social network services
social networking (online)
Social networking sites
sub-group detection performance
taste-based collaborative filtering technique
taste-based group
Taste-based Similarity MANET
unsupervised approach
wikipedia discussions
biblio
Compact Routing Messages in Self-healing Trees
Submitted by grigby1 on Tue, 05/30/2017 - 1:04pm
compact algorithm
compact routing
composability
distributed algorithm
forgiving tree
Internet of Things
low memory
p2p
pubcrawl
Resiliency
self-healing
self-healing networks
biblio
"ID Based Web Browser with P2P Property"
Submitted by grigby1 on Tue, 02/21/2017 - 12:14pm
browser
browser-based Web application
Browsers
caching function
CDN
CDN-P2P-hybrid architecture
content dissemination model
DIANA
domain-insulated autonomous network architecture
host-to-host central model
ID
ID based Web browser
IDNet
internet
Internet content
Internet projects
Internet services
ISP-friendly P2P content delivery technology
online front-ends
overlay networks
p2p
P2P property
Peer-to-peer computing
pubcrawl170103
Servers
streaming content services
Streaming media
Uniform resource locators
usage pattern
web applications
file
Persea : A Sybil-Resistant Social DHT
Submitted by Katie Dey on Thu, 11/01/2012 - 3:52pm. Contributors:
Matthew Wright
Mahdi Nasrullah Al-Ameen
ABSTRACT
SaTC Posters
DHT
p2p
Sybil attack
University of Texas at Arlington
SaTC PI Meeting 2012
Academia
Poster
1
2
next ›
last »