Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
network architecture
biblio
Quantifying the impact of network congestion on application performance and network metrics
Submitted by aekwall on Mon, 03/01/2021 - 3:47pm
Scalability
Conferences
Resiliency
pubcrawl
Correlation
telecommunication network routing
Measurement
computer networks
Topology
parallel processing
telecommunication network topology
Processor scheduling
HPC
Degradation
message passing
network architecture
network metrics
network congestion
application performance
Aries network
dragonfly topology
HPC network architecture
intensive MPI operations
modern high-performance computing systems
network counters
packet transmission statistics
work factor metrics
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
computer network management
distributed firewall application
firewalls
Firewalls (computing)
global network overview
Mininet
network architecture
network logic
Network reconnaissance
network topology
OpenFlow counters
pubcrawl
Reconnaissance
reconnaissance attack
resilience
Resiliency
Scalability
SDN architecture
SDN based environments
SDN controller
SDN-based solution
security policy
software defined networking
software-defined networking
telecommunication network topology
telecommunication traffic
Telecommunications
testing
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 12:35pm
security of data
computer network security
IP networks
Scalability
telecommunication traffic
telecommunication security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
internet
telecommunication network routing
delays
telecommunication network topology
named data networking
Resists
Data Transmission
computer science
DoS attacks
UWSN
underwater acoustic communication
network architecture
denial-of-service attack
Denial-of-Service
denial-of-service attacks
attacker identification
attackers synergize
future network architectures
increased network traffic
Interest Flooding Attack
interest flooding attacks
normal IFAs
SDoS attacks
Synergetic Denial-of-Service
underwater sensor networks
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:00pm
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Computer crime
Entropy
composability
telecommunication traffic
SDN
software defined networking
Attack detection
Switches
microsoft windows
DDoS
network architecture
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service attack
DDoS attack detection method
control logic
DDoS traffic formation
forwarding logic
network cyber security
SDN networks
φ-entropy
biblio
Intelligent SDN Traffic Classification Using Deep Learning: Deep-SDN
Submitted by aekwall on Mon, 01/11/2021 - 12:36pm
Inspection
Scalability
telecommunication traffic
Protocols
computer architecture
computer network management
software defined networking
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
deep learning
pattern classification
Big Data
internet
Training
software-defined networking
network traffic
SDN
network management
Software-Defined Networks
network architecture
Internet traffic
data plane
control plane
exponential growth
high computational cost
deep learning model
deep packet inspection
accurate traffic classification
centralised network controller
deep packet inspection approaches
deep-SDN
fine-grained network management
intelligent SDN traffic classification
network activities
port-based approaches
resource utilisation
Traffic analysis
traffic applications
Traffic classification
biblio
Mission Resilience for Future Army Tactical Networks
Submitted by grigby1 on Tue, 10/06/2020 - 1:10pm
autonomous vehicles
battlefield operations
command and control systems
CPS resilience
cyber assets
Cyber Physical System
cyber physical systems
cyber resilience metrics
cyber-physical systems
future army tactical networks
Measurement
military communication
military operations
mission
Mission Assurance
Mission critical systems
mission essential functions
mission resilience metrics
network architecture
psychometric
pubcrawl
resilience
Resiliency
sensors
Streaming media
tactical forces
tactical network
tactical network architectures
Task Analysis
traditional engineering methods
Weapons
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 10:59am
computer network security
IP networks
security
software defined networking
transport protocols
moving target defense
Resiliency
pubcrawl
composability
Metrics
SDN
process control
Heuristic algorithms
Aerospace electronics
telecommunication network topology
IP address
network architecture
Layout
security protection
Dynamic scheduling
address hoppin
address layout randomization
grid topological structure
internal network address
network intruder
periodic dynamic hopping
space layout randomization system
TCP/IP protocol
Dynamic Networks and Security
biblio
Optimization Strategy of Flow Table Storage Based on “Betweenness Centrality”
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
betweenness centrality
Big Data
clean slate
Cloud Computing
Flow Table Optimization
flow table storage
Human behavior
Metrics
network architecture
network technology
network virtualization
optimisation
optimization
policy governance
Protocols
pubcrawl
Resiliency
Roads
SDN Flow table optimization
SDN switch
Software Defined Network
software defined networking
Switches
telecommunication control
telecommunication network topology
telecommunication switching
virtualisation
biblio
Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
Logic gates
Internet of Things
feature extraction
Artificial Intelligence
IoT
blockchain
Distributed databases
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
privacy
Medical services
Cloud Computing
edge computing
security vulnerabilities
network load
ethereum
Scalability
fog computing paradigms
AI
cloud servers
Data processing
data-sensitive applications
e-health
edge AI
edge artificial intelligence
Electrocardiography
Ethereum blockchain based architecture
Fall Detection
network architecture
privacy-critical systems
responsive systems
smarter systems
U-Health
Ubiquitous Health
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
pubcrawl
Ad Hoc Network Security
aircraft communication
autonomous aerial vehicles
Compositionality
ground control station
message authentication
Metrics
mobile ad hoc network
mobile ad hoc networks
multi-robot systems
multiple node attack
network architecture
network integrity
performance evaluation
quality of service
Real-world experiment
Resiliency
Routing Protocol
Routing protocols
secure routing protocol
Secure UAV Ad hoc routing Protocol
security architecture
security mechanisms
security of data
SUAP
telecommunication security
UAANET
UAV ad hoc network
UAV swarm
wormhole attack detection
1
2
3
next ›
last »