Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attacks
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
linear SVM
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
SDN
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
software defined networking
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
security of data
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
On the Impact of DDoS Attacks on Software-Defined Internet-of-Vehicles Control Plane
Submitted by grigby1 on Mon, 11/02/2020 - 12:09pm
resilience
wireless access points
wired networks
Throughput
Software-Defined Wireless Networks Security
Software-Defined Networking paradigm
Software-Defined Internet-of-Vehicles control plane
Software-Defined Internet-of-Vehicles
software defined networking
service management
security threats
SDN security
SDN
SD-IoV security
SD-IoV environment
Resiliency
computer architecture
pubcrawl
next generation wireless networks
Metrics
Internet of Vehicles
Internet of Things
internet
Human Factors
distributed denial of service attacks
DDoS Attacks
DDoS
controller load
control plane
computer network security
Computer crime
biblio
Security Management and Visualization in a Blockchain-based Collaborative Defense
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Ethereum blockchain
security management dashboard
realworld defense systems
defense alliance
DDoS threat
DDoS defense system
cooperative network defense
BloSS
blockchain-based collaborative defense
blockchain signaling system
attack information
autonomous system
denial-of-service attacks
cyber security analysts
network defense
Computer crime
groupware
visualization
data visualisation
Data visualization
blockchain security
collaboration
blockchain
pubcrawl
Resiliency
DDoS Attacks
telecommunication security
Cryptography
Scalability
ddos mitigation
biblio
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Botnet detection
botnet
TSP-NP hard problem
travelling salesperson nondeterministic polynomial-hard problem-TSP-NP technique
travelling salesman problems
traveling salesperson person
NP-hard problem
nondeterministic polynomial-time hardness
deterministic
Detecting
centralized botnet architecture
centralized architecture-based botnets
Centralized
botnet developers
botnet detection accuracy
pubcrawl
botmaster
attack techniques
combinatorial optimization
Compositionality
optimisation
Metrics
DDoS Attacks
botnets
invasive software
Computer crime
architecture
internet
computer network security
Resiliency
biblio
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
outlier error values
highly structured adjacency matrix structures
increasing sparseness
learning (artificial intelligence)
Matrix decomposition
Metrics
network based attacks
network emulator
network security
network traffic
online learning algorithm
original adjacency matrix
Heuristic algorithms
pubcrawl
representative ecommerce traffic
Resiliency
resultant adjacency matrix
serious economic consequences
singular value decomposition
sparse autoencoder
Sparse matrices
telecommunication traffic
time 225.0 min
decomposition
autoencoder hyper-parameters
Bipartite graph
composability
Compositionality
Computer crime
computer network security
contiguous time intervals
cyber physical systems
Data mining
DDoS Attacks
anomaly detection algorithm
dynamic bipartite graph increments
dynamic graph
dynamic graph mining
dynamic network traffic
Dynamic Networks and Security
ecommerce websites
error distribution
GAAD
gaussian distribution
graph theory
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 12:57pm
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
efficient service delivery
Switches
DDoS detection
Meters
data plane
denial-of-service attack
network resources
centralized controller
attack volume
OpenFlow protocol
network safe
network security threat
networking infrastructure
OpenFlow enabled SDN
UDP flooding
user datagram protocol
DDoS attack mitigation
composability
computer network security
DDoS
IP networks
software defined networking
DDoS Attacks
Resiliency
Human behavior
pubcrawl
Computer crime
Protocols
Metrics
internet
Entropy
OpenFlow
SDN
Bandwidth
biblio
Fast Detection and Mitigation to DDoS Web Attack Based on Access Frequency
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
internet
Web servers
Web request
web applications
Time-frequency Analysis
storage space
security of data
Resiliency
realtime attack response
pubcrawl
Protocols
Processing time
Metrics
IP networks
access frequency
immediate defense mechanism
Human behavior
hacker botnets
DDoS Web attack
DDoS attack mitigation
DDoS Detection and Mitigation
DDoS Attacks
DDoS attack detection
data structures
Computer crime
composability
botnet
attack packets
biblio
DDoS Intrusion Detection Through Machine Learning Ensemble
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
Human behavior
Support vector machines
robust defense mechanism
Resiliency
reduced feature set
pubcrawl
prominent attacks
NSL-KDD dataset
NIDS approach
network intrusion detection system
Metrics
machine learning ensemble
machine learning
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Artificial Neural Networks
feature extraction
ensemble models
Ensemble Machine Learning
emerging DDoS attack patterns
domain-knowledge
distributed denial of service attacks
DDoS Intrusion Detection
DDoS Attacks
DDoS attack detection
DDoS
Data models
computer network security
Computer crime
composability
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »