Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
IP networks
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
computer network security
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
composability
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
complex network
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
hierarchical attack graph
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
biblio
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning
Submitted by grigby1 on Fri, 01/22/2021 - 12:39pm
security of data
feature extraction
Anomaly Detection
data analysis
Unsupervised Learning
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Correlation
Scalability
Cybersecurity
Training data
advanced persistent threat
APT
Clustering algorithms
pattern clustering
advanced persistent threats
Behaviour Analysis
Cyber Threats Intelligence
heterogeneous log-files
Log-files Analysis
malicious behaviour
Multi-stage threats
multistage threats
pattern extraction
biblio
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities
Submitted by aekwall on Mon, 01/11/2021 - 12:34pm
Intrusion Detection
attack mitigation
firewalls
IP networks
Scalability
Industrial Control Systems
transport protocols
Resiliency
pubcrawl
industrial control
prevention systems
denial of service attack
deep packet inspection
DPI capabilities
DPI industrial firewall
gas turbine operation
IDPS
IDPS-Snort
industrial automation control system
industrial automation control systems
industrial control and automation system security
industrial firewall
Intrusion Detection and Prevention System
malicious parameter command injection
Modbus TCP/IP protocol
Modbus-TCP vulnerability
Modbus/TCP
real-time communication
refinery control
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
attestation
channel attackers
client DNS queries
composability
computer network security
Cryptographic Protocols
data privacy
encryption
encryption protocol
hybrid protocol
initialization process
Intel SGX
internet
Internet infrastructure
IP networks
obfuscation protocol
privacy
privacy preservation
Protocols
pubcrawl
server attackers
Servers
service proxy
T2DNS
Third-Party DNS
third-party DNS service
Trusted Computing
trustworthiness
biblio
Design Considerations for Low Power Internet Protocols
Submitted by aekwall on Mon, 12/21/2020 - 12:29pm
IoT
IP networks
Protocols
power aware computing
pubcrawl
composability
energy conservation
internet
6LoWPAN
Energy Efficiency
embedded systems
Bluetooth
interoperability
telecommunication network reliability
personal area networks
IEEE 802.15 Standard
telecommunication network planning
Resiliency
code size
design considerations
IPv6 connectivity
low power Internet protocols
low-power wireless networks
small maximum transfer unit
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
sensors
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
iiot
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
IoT-IIoT networks
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
RPL
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
mobile radio
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
Routing Protocol
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
IoT enabled smart home environment
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
AES
Ciphers
composability
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
IP networks
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
radio links
Resiliency
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
LLN
computer network security
IP networks
Internet of Things
IoT devices
pubcrawl
composability
Routing protocols
wireless sensor networks
Routing
Cybersecurity
6LoWPAN
routing attacks
telecommunication network topology
electronic devices
personal area networks
network components
WSN
Packet loss
Resiliency
6LoWPAN networks
attack condition
contiki operating system
Cooja Simulator
IPv6 over low-power wireless personal area networks
routing protocol for low-power and lossy networks
RPL attacks
RPL protocol functioning
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 11:31am
security of data
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
software defined networking
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
SDN
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
linear SVM
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
1
2
3
4
5
6
7
8
9
…
next ›
last »