Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DoS attacks
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 3:54pm
internet
Scalability
safety hazard
Resiliency
resilience
rapidly volatile attacks
pubcrawl
network security
Named Data Network Security
named data network
malicious interest packets
IP-based networks
IP networks
Internet architecture
Bandwidth
information-centric networking
IFA countermeasures
IFA attackers
Human behavior
Fluctuations
Flooding Attacks
Entropy
DoS attacks
detection accuracy
computer network security
computer architecture
channel capacity
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
biblio
A Defense Mechanism for DoS Attacks in SDN (Software Defined Network)
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
Resiliency
software defined networking
Software Defined Network
security threats
security challenges
SDN security
SDN architecture
Scalability
S-FlowRT
computer network management
resilience
pubcrawl
network security
heterogeneous networks
DoS(Denial of Service)
DoS attacks
denial of service attack
computer network security
biblio
Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
machine learning techniques
WSN
wireless sensor networks
threat vectors
Support vector machines
security threats
security
Routing protocols
pubcrawl
privacy
Metrics
Measurement
attack signature
learning (artificial intelligence)
intrusion detection-and-prevention system
intrusion detection system
hardware resources
DoS attacks
denial-of-service attack
denial of service
decision trees technique
Decision trees
computer network security
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 10:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking
Submitted by grigby1 on Tue, 01/21/2020 - 11:26am
Information Centric Networks
telecommunication network routing
security
Scalability
Resiliency
resilience
pubcrawl
network congestion
NDN router
named data networking
IP networks
internet
interest flooding attacks
information-centric networking architectures
ICN architectures
Information Centric Network
computer architecture
computer network security
computer science
congestion-aware IFA attack detection
congestion-aware interest flooding attacks detection mechanism
data requests
Data Security
delays
Denial of Service attacks
DoS attacks
Floods
future Internet architecture
biblio
Modeling and evaluation of a new IoT security system for mitigating DoS attacks to the MQTT broker
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
low power devices
DoS attacks
generic IoT system
high interaction
high mobility
host Intrusion Detection System
human activities
human control
Internet of Things phenomenon
IoT security system
Denial of Service attacks
Message Queue Telemetry Transport protocol
MQTT
MQTT broker
queueing theory
security over IoT
structured activities
telemetry
actuator security
Human behavior
computer network security
IDS
Monitoring
Internet of Things
security
Protocols
transport protocols
Resiliency
IoT
pubcrawl
composability
Metrics
quality of service
Proposals
Floods
DoS
actuators
biblio
Detection and Prevention of DoS Attacks on Network Systems
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
network systems
internet
Internet development
IoT
IoT contraptions
malevolent undertaking
masterminded resources
Metrics
mishandled machines
incorporating establishment
Organizations
PC structures
pubcrawl
resilience
Resiliency
Servers
standard action
strike action
DDoS Attack
botnet
Cloud Computing
composability
Computer crime
computer network security
convergence
DDoS
DDoS ambushes
anomalous express
DDoS Attack Prevention
denial
distributed denial of service strike
DoS attacks
flood
Floods
Human behavior
biblio
Investigating and securing communications in the Controller Area Network (CAN)
Submitted by grigby1 on Wed, 09/05/2018 - 10:55am
automobile
controller area network security
telecommunication networks
standard communication network
light emitting diodes
field buses
denial-of-service attacks
controller area networks
controller area network
CAN-related systems
CAN protocol security features
CAN bus nodes
CAN
broadcast communications network
broadcast communication
security
DoS attacks
telecommunication computing
resilience
automobiles
Network
computer network security
message authentication
Conferences
Protocols
communication security
authentication
Resiliency
pubcrawl
« first
‹ previous
1
2
3
4
next ›
last »