Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Fostering collaboration among CPS professionals in academia, government, and industry

CPS-VO

signature based detection method

biblio

Visible to the public Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture

Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
  • pubcrawl
  • anomaly based detection method
  • Bro
  • bro IDS application
  • composability
  • computer network security
  • CPU usage
  • delays
  • existing network traffic
  • IDS
  • intrusion detection system
  • memory usage
  • network activity
  • network quality
  • Packet loss
  • packet loss parameters
  • QoS
  • QoS measurement
  • quality of service
  • resilience
  • Resiliency
  • SDN
  • SDN architecture
  • service comparison analysis
  • signature based detection method
  • Snort
  • Snort IDS
  • software define network architecture
  • software defined networking
  • telecommunication traffic
  • testing
  • Throughput
  • tools
biblio

Visible to the public Implementation of Blockchain Based Distributed Web Attack Detection Application

Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
  • Cryptography
  • blockchain
  • Distributed databases
  • pubcrawl
  • resilience
  • Resiliency
  • internet
  • composability
  • smart contracts
  • Metrics
  • Reliability
  • blockchain based web attack detection model
  • firewalls
  • signature based detection
  • signature based detection method
  • Stakeholders
  • web application firewalls
  • Web attack detection
  • web attack detection application
  • Web platforms
  • Web servers
  • web-based attacks
  • Co
  • command injection attacks

Terms of Use  |  ©2021. CPS-VO