Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
Towards Autonomic Entropy Based Approach for DDoS Attack Detection and Mitigation Using Software Defined Networking
Submitted by grigby1 on Tue, 01/25/2022 - 4:50pm
Linux
Traffic
mechatronics
data plane
cloud servers
Autonomic Security
control plane
denial-of-service attack
DDoS Attack
computer architecture
SDN
Law
composability
Entropy
Resiliency
resilience
pubcrawl
Servers
biblio
DDOS Attack Detection Accuracy Improvement in Software Defined Network (SDN) Using Ensemble Classification
Submitted by aekwall on Mon, 01/10/2022 - 12:53pm
simulation
information security
Support vector machines
internet
Servers
SDN
pubcrawl
Scalability
Resiliency
Human behavior
POX controller
Decision trees
denial-of-service attack
Accuracy
DDoS Attack
Attack vectors
biblio
Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing
Submitted by aekwall on Mon, 01/10/2022 - 12:47pm
Human behavior
Compositionality
Resiliency
Workload distribution
Proxy re-encryption
parallel computing
Big data sharing
Asymmetric Encryption
Load management
Task Analysis
Metrics
pubcrawl
Heuristic algorithms
Servers
Cloud Computing
Big Data
delays
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
biblio
Smart Key Using AES Algorithm
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
IoT
Servers
Scalability
Resiliency
resilience
real-time systems
Raspberry Pi
pubcrawl
Mobile Applications
Metrics
key
Advanced Encrypted System (AES)
internet
Human behavior
Hardware
Firebase
encryption
E-Lock
authentication
android encryption
Android app
biblio
Secure Key Exchange by NFC for Instant Messaging
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
operating systems
Upper bound
standards
Servers
Scalability
Resiliency
resilience
pubcrawl
Protocols
android encryption
Metrics
man-in-the-middle attack
Key exchange
Instant messaging
Human behavior
End-End Encryption
encryption
Elliptic Curve Diffie-Hellman
biblio
FastMove: Fast IP Switching Moving Target Defense to Mitigate DDOS Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 12:35pm
denial-of-service attack
Switches
Servers
Resiliency
resilience
pubcrawl
moving target defense
Metrics
IP networks
IP address
Zero day attacks
DDoS
Computer crime
computer architecture
composability
Complexity theory
Cloud Computing
Bot
attack
defense
biblio
An Advanced Persistent Threat (APT)-Style Cyberattack Testbed for Distributed Energy Resources (DER)
Submitted by aekwall on Mon, 12/20/2021 - 12:21pm
Integrated circuit modeling
advanced persistent threat
Penetration Testing
distributed power generation
distributed energy resources
Cybersecurity
Cyber Kill Chain
Advanced Persistent Threat (APT)
SCADA systems
Data models
Human behavior
Resiliency
Metrics
pubcrawl
tools
Scalability
real-time systems
Servers
biblio
Deep Reinforcement Learning Based Node Pairing Scheme in Edge-Chain for IoT Applications
Submitted by grigby1 on Mon, 11/29/2021 - 2:49pm
Mobile Edge Computing (MEC)
Task Analysis
Tamper resistance
Servers
Scalability
resource management
pubcrawl
Policy Gradient (PG) method
optimization
blockchain
Metrics
Internet of Things (IoT)
Internet of Things
Human Factors
Human behavior
edge computing
Deep Reinforcement Learning (DRL)
blockchain technology
biblio
A Survey of Intrusion Detection System (IDS) using Openstack Private Cloud
Submitted by aekwall on Mon, 11/29/2021 - 2:02pm
Monitoring
Intrusion Detection
Cloud Computing
Servers
Computer crime
pubcrawl
Scalability
Resiliency
malware
intrusion detection system
anomaly based IDS
Signature based IDS
signature based defense
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »