Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attacks
biblio
An Effective DDoS Defense Scheme for SDN
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
prediction value
Taylor series
Switches
software defined networking
software defined networkcontroller
security gateway
SDN controller
Scalability
Resiliency
resilience
pubcrawl
Computer crime
openflow switch
Logic gates
IP networks
internetworking
Human Factors
honey pots
Entropy
distributed denial-of-service attacks
DDoS Attacks
computer network security
biblio
Secure the internet of things with challenge response authentication in fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog computing based security system
VPN server
Virtual private networks
virtual private network
Servers
security of data
security
IoT system
IoT devices
Internet of Things
authentication
Fog computing
FOCUS system
edge computing
distributed denial of service attacks
DDoS Attacks
computer network security
Computer crime
Cloud Computing
challenge-response authentication
biblio
The Design and Implementation of a Multicast Address Moving Target Defensive System for Internet-of-Things Applications
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
multicast communication
working IoT operating system
Synchronization
Simple Agile RPL multiCAST
SARCAST
Routing protocols
Resistance
Resiliency
Reconnaissance
pubcrawl
Protocols
operating systems (computers)
Network reconnaissance
network performance
address agility
multicast address moving target defensive system
IP networks
Internet-of-Things routing protocol
Internet-of-Things applications
Internet of Things
DRM
distributed denial-of-service attacks
DDoS Resistant Multicast
DDoS protection
DDoS Attacks
computer network security
Computer crime
computer architecture
biblio
SDN Security Plane: An Architecture for Resilient Security Services
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
SDN security plane
pubcrawl
real-time user-defined security
remotely controlled network
Resiliency
Resilient Security Architectures
resilient security services architecture
SDN
SDN controller
SDN security design
Proposals
SDN switches
Security plane
security-related data exchange
software defined networking
telecommunication control
telecommunication switching
third party agent
third party software module
data plane
centralised control
centralized control
computer architecture
Computer crime
computer network performance evaluation
computer network security
control plane
control systems
data packet forwarding
Agent
DDoS Attack Prevention
DDoS Attacks
IP networks
network communications
network performance
network security features
OpenFlow
Ports (Computers)
biblio
Towards DDoS Attack Resilient Wide Area Monitoring Systems
Submitted by grigby1 on Tue, 01/16/2018 - 6:28pm
CPS resilience
composability
DDoS Attack Prevention
DDoS Attacks
Human behavior
Metrics
pubcrawl
Resiliency
security
Wide Area Monitoring Systems
biblio
Mitigating HTTP GET flooding attacks in SDN using NetFPGA-based OpenFlow switch
Submitted by grigby1 on Tue, 01/16/2018 - 6:27pm
Human behavior
Uniform resource locators
Switches
Software-Defined Networking architecture
software defined networking
SDN
Resiliency
pubcrawl
Protocols
per-URL counting mechanism
OpenFlow
NetFPGA-based OpenFlow switch
Metrics
IP networks
composability
HTTP GET flooding attacks mitigation
HTTP GET Flooding
hardware-based defense system
Hardware
Floods
field programmable gate arrays
distributed denial-of-service attacks
DDoS Attacks
DDoS attack mitigation
DDoS
computer network security
Computer crime
biblio
A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Firewalls (computing)
smart power grids
Smart Grids
smart grid AMI networks
Servers
Resiliency
pubcrawl
power system security
power meters
Metrics
Infrastructure as a Service (IaaS)
Human behavior
Grid Openflow firewall (GOF)
advanced metering infrastructure
firewalls
Distributed Denial of Service (DDoS)
distributed denial of service
DDoS Attacks
DDoS attack mitigation
Computer crime
composability
cloud-based openflow firewall
cloud computing technology
Cloud Computing
Bandwidth
Advanced Metering Infrastructure (AMI)
biblio
Review on Detection Techniques against DDoS Attacks on a Software-Defined Networking Controller
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
information and communication technologies
telecontrol
software-defined networking controller
software defined networking
SDN security
SDN controller
SDN
Resiliency
remotely controlled networks
pubcrawl
Protocols
Metrics
IP networks
internet
centralised control
Human behavior
Entropy
detection techniques
DDoS detection
DDoS Attacks
DDoS attack detection
control systems
computer network security
Computer crime
composability
Communication Systems
centralized controller
biblio
Entropy clustering approach for improving forecasting in DDoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:44pm
pattern clustering
forecasting theory
FPR
IDS
intrusion detection system
k-means clustering analysis
network analysis
network security
online anomaly detection
forecasting
Ports (Computers)
proactive forecast
project industrial partner
pubcrawl170109
Shannon entropy
Shannon-entropy concept
volume anomaly
alert management
feature extraction
false positive rate
entropy clustering approach
Entropy
distributed denial-of-service (DDoS) detection
distributed denial-of-service
Digital Forensics
digital forensic analysis
DDoS Attacks
cyber-range simulation dataset
computer network security
Computer crime
Clustering algorithms
clustering algorithm
Algorithm design and analysis
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Wed, 05/06/2015 - 10:26am
invasive software
UDP-storm
transport protocols
TCP-flood
Storms
state-of-the-art botnets detection
principal component analysis
Measurement
IT industry
attack-as-a-service delivery model
DDoS Attacks
Correlation
Context
computer network security
Computer crime
Cloud Computing
botclouds
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »