Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DoS attacks
biblio
Machine learning aided traffic tolerance to improve resilience for software defined networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
SDN
OpenFlow
pattern classification
POX controller platform
Prediction algorithms
pubcrawl
real-time systems
ReSDN
resilience
resilience framework
Resiliency
routing table
network security
SDNs
software defined networking
Software Defined Networks
Survivability
SYN flood
telecommunication network routing
telecommunication traffic
Traffic Management
traffic tolerance
Training
feature extraction
centralised control
centralised controller
composability
computer network management
computer network reliability
computer network security
Decision Making
DoS attack
DoS attacks
Engines
attacks classification
flexible management
Future Internet
intrusion tolerance
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious intrusion detection
Mininet simulator
MIT KDD 1999 dataset
neptune attack
biblio
DoS Protection in the Cloud through the SPECS Services
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
FP7-ICT programme project
supply chains
SPECS service
security-as-a-service
security SLA-based approach
security service level agreement
Security Metrics
pubcrawl170112
OSSEC
Monitoring
Measurement
Cloud Computing
DoS protection
DoS attacks
DoS attack
contracts
Containers
computer network security
Computer crime
cloud security monitoring
cloud environment
biblio
Data security in Smart Grid with hardware implementation against DoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
IP networks
SYNflooding
SYN flooding
smart resources
smart power grids
Smart Grid
Servers
secure Web server algorithm
pubcrawl170109
Protocols
power engineering computing
LPC1768 processor
ARM Processor
internet
Hardware Implementation
Floods
DoS attacks
DoS
denial of service attack
Data Security
Cybersecurity
Computers
computer network security
Computer crime
biblio
Self-triggered coordination over a shared network under Denial-of-Service
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
Clocks
Computer crime
computer network security
cyber-physical systems
denial-of-service attacks
DoS attacks
DoS frequency
Jamming
network agents
persistency-of-communication
PoC
pubcrawl170109
self-triggered coordination
shared network
Time-frequency Analysis
Topology
biblio
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
network layer attacks
wireless sensor networks
wireless mesh routing protocol
wireless mesh networks
wireless mesh network
Wireless communication
security
Routing protocols
Routing Protocol
Routing
pubcrawl170109
Ambient Assisted Living
IoT-based ambient assisted living applications
Internet of Things
eHealthcare
DoS attacks
Denial of Service attacks
denial of service
data packet delivery ratio
computer network security
Computer crime
biblio
"Detectability of low-rate HTTP server DoS attacks using spectral analysis"
Submitted by abfox on Tue, 02/14/2017 - 2:47pm
hypermedia
transport protocols
Temperature measurement
telecommunication traffic
Spectral analysis
Social network services
Servers
pubcrawl170101
operating systems
network traffic
Low-rate DoS attack
internet
Instruction sets
advanced persistent threat
HTTP server
HTTP 1.1
DoS flooding attacks
DoS attacks
denial-of-service attacks
computer network security
Computer crime
attack simulator
Attack detection
Apache HTTP Server software
Apache HTTP Server
biblio
Investigating the utility of S-transform for detecting Denial-of-Service and probe attacks
Submitted by BrandonB on Fri, 05/01/2015 - 8:20am
Ports (Computers)
wavelet transforms
wavelet transform
two-dimensional image
traffic signal
time-frequency representation technique
Time-frequency Analysis
telecommunication traffic
signal processing method
S-transform
Probes
probe attacks
accurate attack signatures
Otsu method
Intrusion Detection Systems
internet
image processing method
IDS
frequency components
DoS attacks
denial-of-service detection
computer network security
Computer crime
biblio
Bandwidth Distributed Denial of Service: Attacks and Defenses
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
denial of service
Servers
Routing protocols
network congestion
legitimate traffic
IP networks
internet
DoS mitigation
DoS attacks
DoS
Bandwidth
DDoS
computer security
computer network security
Computer crime
BW-DDoS defense
BW-DDoS attacks
brute force mechanisms
bandwidth flooding
bandwidth distributed denial-of-service
biblio
Combating False Data Injection Attacks in Smart Grid using Kalman Filter
Submitted by BrandonB on Thu, 04/30/2015 - 11:55am
Kalman filters
χ2-square detector
state process
smart power grids
smart power grid security
Smart Grids
sensors
security
predictor variable series
power system state estimation
power system security
power system faults
power system
power engineering computing
Mathematical model
actuators
Kalman filter
fault diagnosis
fault detection
false data injection attack detection
Euclidean distance metrics
Euclidean detector
Equations
electric sensing devices
DoS attacks
Detectors
control systems
computer network security
communication infrastructure
« first
‹ previous
1
2
3
4