Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
IP networks
biblio
A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Submitted by grigby1 on Fri, 04/09/2021 - 11:36am
Internet of Things
security
IoT
IP networks
Peer-to-peer computing
pubcrawl
Resiliency
computer network security
wireless sensor networks
composability
Routing
data packets
Routing protocols
resilience
WSN
telecommunication network topology
Blackhole attack
IDS
Routing Protocol
network performance
network reliability
Black hole attackers
count data
destination data delivery
exchange data routing
expected IDS
L-IDs
L-IDS procedure
LHV value
Link Hop Value-based Intrusion Detection System
routing loops
RPL performance
RPL Routing
RPL routing security scheme
sensor devices
sensor nodes
wireless link
biblio
An IDS Rule Redundancy Verification
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
tools
IP networks
pubcrawl
Resiliency
computer network security
Protocols
intrusion detection system
composability
telecommunication traffic
Payloads
Redundancy
Semantics
Syntactics
resilience
IDS
Snort
anomaly network traffics
commented rules
IDS rule redundancy verification
IDS rule verification
network security software
open-source IDS system
public rulesets
Snort community
Snort rule combinations
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
IP networks
pubcrawl
Resiliency
computer network security
microprocessor chips
wireless sensor networks
intrusion detection system
Wireless communication
composability
telecommunication traffic
multiprocessing systems
DDoS Attacks
Virtual machining
virtual machines
DDoS
resilience
operating systems (computers)
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
Central Processing Unit
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
biblio
Adaptive Caching for Beneficial Content Distribution in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
IP networks
Scalability
telecommunication traffic
security
data traffic
Resiliency
pubcrawl
internet
Economics
service providers
network topology
quality of service
Proposals
QoS
information-centric networking
Information Centric Networks
in-network caching
Information-Centric Networking (ICN)
content distribution
cache hit rate
adaptive caching mechanism
beneficial caching scheme
beneficial content distribution
cache diversity
content-based providers
Future Internet (FI)
ICN interconnections
in-network caching mechanism
network design
next-generation networking
request arrival rate
utility-based replacement
biblio
An Information-centric NFV-based System Implementation for Disaster Management Services
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
IP networks
Scalability
virtualisation
computer network management
Resiliency
pubcrawl
internet
network topology
Topology
law enforcement
Information Centric Networks
network function virtualization
container
hospitals
Gold
emergency management
openstack
connection-oriented communication
Disaster management
disaster recovery phase
flexible rescue group communication
ICN
information centric disaster management
information-centric disaster management system
information-centric network management
information-centric NFV-based system implementation
IP-based approach
low communication overhead
mobile rescue operations
name-based interest-oriented communication approach
ndn nfv
network fragmentation
network infrastructure management
Seoul disaster management services
system implementation
Telephony
vICSNF
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
Anomaly Detection
attack traffic
Computer crime
computer network security
Cyber Physical System
DDoS detection
DDoS detection algorithm
DDoS intrusion detection approach
detection stage
Entropy
fuzzy clustering
Fuzzy logic
fuzzy relevance function
graph based features
graphics-based features
Histograms
internet
Internet technologies
Intrusion Detection
IP
IP networks
Metrics
nonattack traffic
pubcrawl
resilience
Resiliency
security
service attacks
telecommunication traffic
uncertainty
biblio
Expert System for Assessing the Efficiency of Information Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:26pm
audit information security
auditing
authorities
coefficient of significance
Data protection
expert assessment method
expert system
expert systems
Human behavior
information protection system
information security
information security audit
information security efficiency assessment
information system
informed decisions
IP networks
Monitoring
organizational and administrative documents
organizational measures
Organizations
personal data
protected information
pubcrawl
resilience
Resiliency
Scalability
security
security of data
technical measures
biblio
Evolutionary Design of Hash Functions for IPv6 Network Flow Hashing
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
Monitoring
IP networks
Task Analysis
Resiliency
genetic algorithms
Sorting
pubcrawl
computer network
Throughput
Compositionality
evolutionary computation
Hash Function
hash algorithms
network flow
Cartesian genetic programming
genetic programming
high-quality network flow hashing
high-speed network systems
Internet Protocol
IPv6 flow hashing
IPv6 network flow hashing
linear genetic programming
multiobjective evolutionary design method
network monitoring probes
nondominated sorting genetic algorithm II
transport protocols
biblio
Game-Like Captchas for Intrusion Detection
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
authentication
authorisation
biometric authentication
biometrics (access control)
captchas
composability
credential stuffing
game choices
game play
game-like captchas
Games
Google re-captcha
Human behavior
internet
Intrusion Detection
intrusion detection system
IP networks
pubcrawl
Support vector machines
user authentication
user interactions
biblio
Evaluation of Network Assisted Handoffs in Heterogeneous Networks
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
5G
5G mobile communication
beyond 5G networks
clean slate
collaboration
computer architecture
Distributed Mobility Management
DMM
Handover
hard handoff
heterogeneous networks
Human behavior
ICN
information centric network architecture
internet
IP network
IP networks
LTE
Metrics
mobile computing
mobility management (mobile radio)
multihoming
named-object
network assisted handoffs
ORBIT testbed
policy-based approach
pubcrawl
Rebinding
resilience
Resiliency
seamless data transfer
soft handoff
Throughput
WiFi
1
2
3
4
5
6
7
8
9
…
next ›
last »