Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DoS attack
biblio
Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach
Submitted by aekwall on Mon, 08/17/2020 - 10:18am
graph-based outlier detection in Internet of Things
attack graphs
attack signatures
current security solutions
denial-of-service attacks
DoS Attack Detection
GODIT
graph data
graph mining
DoS attack
graph-stream anomaly detection approaches
IoT-equipped smart home show
machine learning approaches
packet inspection
real-time graph stream
smart home IoT devices
smart home IoT traffic
cyber-attacks
IP networks
Internet of Things
real-time systems
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
computer network security
Anomaly Detection
Data mining
Intrusion Detection
IoT security
Smart homes
Smart Home
Predictive Metrics
biblio
Performance Analysis of Between Software Defined Wireless Network and Mobile Ad Hoc Network Under DoS Attack
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
SDN structure
network security
Performance analysis
performance criteria
performance values
Resiliency
Routing protocols
SDN
SDN controller
network performance
SDN technology
Software Defined Network
software defined networking
Software Defined wireless Network
traditional network structure
traditional network used today
wireless network technologies
pubcrawl
network interruption
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET structure
MANET routing protocols
MANET
DoS attack
DoS
controller
computer network security
Compositionality
communication technologies
Bandwidth
Ad Hoc Network Security
biblio
Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack
Submitted by aekwall on Mon, 07/20/2020 - 9:44am
light emitting diodes
synchronization message
synchronization deviation
on-board communications
counter value
counter synchronization method
CAN
controller area networks
Security Evaluation
automobile security
replay attack
DoS attack
Automotive engineering
controller area network security
message authentication
Synchronization
synchronisation
pubcrawl
Resiliency
cyber-physical systems
Receivers
Internet of Things
Conferences
computer network security
biblio
Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/11/2020 - 10:09am
persistent jamming attack
internal hardware Trojans
jamming attack
low-power transceivers
ML classifiers
network-on-chip communications
NoC switches
nonscalable multihop data transmission paths
On chip interconnect
On chip security
on-chip data transfer
on-chip wireless medium
denial-of-service attacks
radio transceivers
radiofrequency interconnections
random burst error correction code
Switches
switching networks
WiNoC security
wired NoC architectures
wireless interconnection
Wireless NoC
wireless NoC architectures
network on chip security
system-on-chip
telecommunication security
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Wireless communication
Metrics
machine learning
telecommunication network routing
telecommunication computing
radio networks
Scalability
DoS
Hardware Security
error correction codes
radiofrequency interference
DoS attack
Jamming
denial-of-service attack
machine learning classifier
HT
network-on-chip
data transfer security threats
biblio
A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
Predictive Metrics
linearisation techniques
Lyapunov function theory
Lyapunov methods
Networked Control Systems Security
nonlinear CPSs
nonlinear cyber-physical systems
nonlinear systems
Numerical stability
iterative linearization algorithm
pubcrawl
Resiliency
stability
Stability analysis
stochastic stability
stochastic stability.
T-S fuzzy model
telecommunication control
control system synthesis
Security actuators
closed loop systems
closed-loop system stability
communication link
compensation
compensation control
composability
computer network security
Control Theory
controller gain
cyber-physical systems
denial-of-service attack
dissipativity
DoS attack
fuzzy rules
fuzzy systems
biblio
An Effective Swarm Optimization Based Intrusion Detection Classifier System for Cloud Computing
Submitted by aekwall on Mon, 01/27/2020 - 9:25am
Flooding Attack
Task Analysis
swarm optimization algorithms
Swarm Intelligence Optimization
Swarm intelligence algorithm
Swarm Intelligence
replay attack
pubcrawl
particle swarm optimization
particle swarm optimisation
optimization
numerical problems
Intrusion detection classifier
foraging characteristics
ABC algorithm
effective swarm optimization based intrusion detection classifier system
effective classifier
DoS attack
computer network security
Compositionality
composability
Communication Systems
cloud computing environment
Cloud Computing
Classification algorithms
Artificial Intelligence
artificial bee colony algorithm
Artificial Bee Colony
biblio
Jellyfish attack detection and prevention in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:38am
JF reorder attack
telecommunication security
signal processing
sensors
security
Resiliency
resilience
pubcrawl
Protocols
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
attack prevention
JF periodic dropping attack
JF delay variance attack
JF attack delay data packets
Jellyfish Delay Variance Attack (JFDV)
jellyfish attack prevention
jellyfish attack detection
Jellyfish Attack
DoS attack
delays
Conferences
Compositionality
biblio
Using Mathematical Methods Against Denial of Service (DoS) Attacks in VANET
Submitted by grigby1 on Thu, 06/07/2018 - 2:03pm
Metrics
VANET
security
Resiliency
resilience
Policy-Governed Secure Collaboration
policy-based governance
Policy
neural networks security
neural network
MANET
mathematical models.
logistic regression
DoS attack
cyber physical systems
collaboration
Attack detection
pubcrawl
attack mitigation
biblio
DoS Attacks in Electrical Cyber-Physical Systems: A Case Study Using TrueTime Simulation Tool
Submitted by grigby1 on Thu, 05/24/2018 - 11:30am
predictive control
Metrics
model predictive control algorithm
networked control systems
power grid system
power grid vulnerability analysis
power grids
power system control
power system security
Mathematical model
pubcrawl
resilience
Resiliency
sensors
TrueTime Network Library
TrueTime simulation tool
TureTime Network Library
Vulnerability Analysis
Decentralized Control
Communication networks
composability
Compositionality
computer network security
control instructions actuators
Control Strategy
cyber security
cyber-physical systems
actuators
decentralized control strategies
distributed control
distributed control strategies
DoS attack
DoS attacks
ECPSs
electrical cyber-physical systems
Generators
biblio
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
Submitted by K_Hooper on Wed, 05/09/2018 - 9:52am
pubcrawl
telecommunication traffic
Software Defined Networks
software defined networking
sFlow-RT
sFlow
security of data
security
SDN security
SDN
Scalability
Resiliency
computer architecture
Protocols
performance aware Software Defined Networking
OpenFlow
Monitoring
Hardware
DoS attack
Denial of Service attacks
denial of service attack
data centers
control systems
computer network security
« first
‹ previous
1
2
3
4
next ›
last »