Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DoS attacks
biblio
A secure reputation based architecture for MANET routing
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Routing
Node identity
Prime Product Number
pubcrawl
Reliability
reputation level table
Reputation Value
resilience
Resiliency
Monitoring
Routing misbehavior
Routing protocols
secure reputation based architecture
secure routing protocol
specific prime number
telecommunication security
Wireless ad hoc network
Worm hole attacks
legitimacy value table
backbone network
civilian domains
Compositionality
Cryptography
denial of service
Denial of Service attacks
DoS attacks
grid structure
attack mitigation
malicious node effect mitigation
MANET
MANET routing
Metrics
military domains
mobile ad hoc network
mobile ad hoc networks
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality
biblio
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
physical unclonable function protection
Xilinx SoC
system-on-chip
system security techniques
Software
security protection
security policies
security compromises
security challenges
secure architecture extension
Resiliency
resilience
PUFSec framework
PUF workflow
PUF hardware
pubcrawl
Access Control
Networked Control Systems Security
Monitoring
Modeling Attacks
Metrics
internal PUF design
hardware isolation
Hardware
DoS attacks
Denial of Service attacks
Data protection
control systems
computer network security
computer architecture
composability
ARM Processor
biblio
Towards a Stochastic Model for Integrated Detection and Filtering of DoS Attacks in Cloud Environments
Submitted by grigby1 on Thu, 06/07/2018 - 3:09pm
security
pubcrawl
Scalability
Cloud Computing
resilience
Resiliency
Stochastic computing
DoS attacks
Performance modeling
queueing theory
Stochastic Computing Security
biblio
DoS Attacks in Electrical Cyber-Physical Systems: A Case Study Using TrueTime Simulation Tool
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
predictive control
Metrics
model predictive control algorithm
networked control systems
power grid system
power grid vulnerability analysis
power grids
power system control
power system security
Mathematical model
pubcrawl
resilience
Resiliency
sensors
TrueTime Network Library
TrueTime simulation tool
TureTime Network Library
Vulnerability Analysis
Decentralized Control
Communication networks
composability
Compositionality
computer network security
control instructions actuators
Control Strategy
cyber security
cyber-physical systems
actuators
decentralized control strategies
distributed control
distributed control strategies
DoS attack
DoS attacks
ECPSs
electrical cyber-physical systems
Generators
biblio
Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
power system faults
message spoofing attacks
Metrics
packet radio networks
power engineering computing
power grid efficiency
power grid system
power grid vulnerability analysis
power grids
internet
power system reliability
power system security
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security of data
cyber-attacks
Base stations
Cascading Failures
cellular radio
complex CPPS
complex cyber physical power system
composability
Compositionality
Cyber Attacks
authentication
Cyber-physical power system (CPPS)
DoS attacks
DTU
general packet radio service
GPRS
GPRS-based SCADA systems
Ground penetrating radar
IEEE 9-node system
biblio
Protecting SDN controller with per-flow buffering inside OpenFlow switches
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
software defined networking
per-flow buffering
process control
Protocols
pubcrawl
Resiliency
routers
Scalability
SDN controller
SDN security
Servers
packet-in flood
standards-compliant protocol
statistical analysis
switch flow tables
switch memory
table-miss
telecommunication control
telecommunication network routing
telecommunication switching
telecommunication traffic
working principles
DPDK
centralized controller
computer network security
control channel
control logic
control plane
control systems
data plane
denial of service
denial-of-service attacks
DoS attacks
buffer\_id feature
Floods
heavy control traffic conditions
individually buffered packets
IP networks
Monitoring
Open vSwitch
OpenFlow
OpenFlow protocol
OpenFlow switches
OpenFlow traffic
biblio
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Submitted by K_Hooper on Wed, 05/02/2018 - 10:40am
algorithmic complexity attacks
composability
DoS attacks
fuzzing
Metrics
pubcrawl
Resiliency
resource exhaustion attacks
sybil attacks
biblio
Security Control for Linear Systems Subject to Denial-of-Service Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 2:53pm
resilience
two-mode switching control method
Time Frequency Analysis
Stability analysis
stability
Security Control
security
secure control
Scalability
Robustness
Resiliency
closed loop systems
pubcrawl
Metrics
Linear systems
event-triggered control systems
event-triggered control
DoS attacks
denial-of-service attacks
cyber physical systems
Computer crime
closed-loop stability
biblio
Inferring OpenFlow Rules by Active Probing in Software-Defined Networks
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
delays
Receivers
Reconnaissance
Resiliency
rule inference
security threats
software defined networking
Software-Defined Networks
telecommunication security
active probing
Apriori algorithm
clustering
control systems
controllers
reactive rules
Denial-of-Service
DoS attacks
inferring sdn by probing and rule extraction
INSPIRE
IP networks
k-means clustering
Network reconnaissance
OpenFlow rules
packet delay time
Probes
Probing
probing packets
pubcrawl
« first
‹ previous
1
2
3
4
next ›
last »