Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attacks
biblio
DDoS Prevention Using D-PID
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
Heuristic algorithms
telecommunication network routing
Static Path Identifiers
Servers
Routing
Resiliency
resilience
pubcrawl
PIDs
Metrics
internet
inter-domain routing component
Inter-domain routing
inter-domain path connector
Human behavior
attacks
Floods
Dynamic Path Identifiers
distributed denial of service attack
DDoS prevention
DDoS Attacks
DDoS Attack Prevention
DDoS
D-PIDs
D-PID usage
control systems
Conferences
computer network security
Computer crime
composability
biblio
MAEC-X: DDoS Prevention Leveraging Multi-Access Edge Computing
Submitted by grigby1 on Wed, 12/18/2019 - 2:44pm
Human behavior
Resiliency
resilience
pubcrawl
Protocols
network security
multitier networking
multiaccess edge computing
Monitoring
Metrics
MAEC-X
Internet-of-Everything era
internet
5G mobile communication
edge computing
denial-of-services attacks
DDoS prevention solution
DDoS prevention
DDoS Attacks
DDoS Attack Prevention
computer network security
Computer crime
computer architecture
composability
5g network
biblio
A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network
Submitted by aekwall on Wed, 12/18/2019 - 2:26pm
internet
traditional network architecture
software-driven network
software-based networks
service attacks
new-machine learning-based collaborative DDoS mitigation mechanism
DDoS mitigation technique
DDoS detection
DDoS attack mitigation
Switches
resilience
Software Defined Network
Attack detection
SDN
Computer crime
Metrics
machine learning
composability
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
DDoS Attacks
software defined networking
security
telecommunication security
Servers
computer network security
biblio
Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN)
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
SDN
virtual machines
virtual machine
Software Defined Network (SDN)
sFlow mitigation technology
sFlow
real time detection
Mininet
DDoS attack mitigation
distributed denial of service attacks
telecommunication control
Switches
resilience
Attack detection
Computer crime
OpenFlow
network traffic
Metrics
composability
pubcrawl
Human behavior
DDoS Attacks
software defined networking
real-time systems
Protocols
telecommunication traffic
DDoS
computer network security
biblio
Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
routing overhead
DDoS attack mitigation
vehicular ad hoc network
VANETs Security
NS-2
network packet loss
network environment
mobile ad hoc networks
greedy approach
distributed denial of service attacks
attack topology
DDoS Attack
resilience
Attack detection
telecommunication network topology
attack mitigation
network throughput
Throughput
Measurement
telecommunication network routing
Metrics
vehicular ad hoc networks
VANETs
Routing
composability
pubcrawl
Human behavior
DDoS Attacks
computer network security
Computer crime
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
Human Factors
transaction confirmation process
Software
service attacks
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Peer-to-peer computing
peer to peer security
P2P network
network protocol
network message exchanges
Metrics
bitcoin
human factor
Human behavior
distributed denial of service attacks
denial of service
DDoS Attacks
Data mining
Cryptographic Protocols
cryptocurrencies
computer network security
Computer crime
blockchain
Bitcoin peer-to-peer network
bitcoin mining process
bitcoin message exchanges
bitcoin core software
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
biblio
Effective Botnet Detection Through Neural Networks on Convolutional Features
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
invasive software
Training
telecommunication traffic
Servers
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Payloads
P2P botnet datasets
Neural networks
Network traffic classification
Metrics
machine learning
learning (artificial intelligence)
IP networks
botnet
internet
feedforward neural nets
feed-forward artificial neural network
feature extraction
DDoS Attacks
cybercrimes
convolutional neural networks
convolutional features
convolution
computer network security
Computer crime
Compositionality
botnets
botnet detection system
Botnet detection
biblio
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks
Submitted by aekwall on Wed, 02/13/2019 - 12:02pm
learning (artificial intelligence)
Support vector machines
support vector machine
Servers
security of data
Scalability
Resiliency
Random Forest
pubcrawl
privacy leakage
principal component analysis
machine learning-based detection methods
machine learning algorithms
machine learning
Attack vectors
Human behavior
Feature Selection
feature extraction
Electronic mail
early detection
distributed cyber attacks
denial of services
DDoS Attacks
data privacy
cyberattack
cyber security community
Command & Control communication
C&C communication
biblio
A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Human behavior
virtual honeypot
uncommon attacks
strange vindictive attacks
Servers
Scalability
Resiliency
resilience
pubcrawl
Mitigation and hybrid algorithms
IP networks
intrusion prevention system
Interruption counteractive action framework
Internet Service Providers level
IDS
Human Factors
authority level system attacks
honeypot system
honey pots
Floods
expensive network resources
exceptional security risk
end-clients
distributed denial-of-service attack
digital attacks
detection
DDoS Attacks
DDoS Attack
computer network security
Computer crime
botnet
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »