Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Application Layer
biblio
An Overview on Detection and Prevention of Application Layer DDoS Attacks
Submitted by grigby1 on Thu, 06/22/2023 - 1:10pm
attacks
Low and Slow attacks
Layer 7
HTTP flooding
HOIC
Application Layer
Slowloris
Ions
DDoS Attack Prevention
codes
Resiliency
pubcrawl
denial-of-service attack
Compositionality
DDoS
composability
Databases
Protocols
web services
Conferences
resilience
Metrics
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
Security of Big Data Based on the Technology of Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 2:33pm
resilience
big data security in the cloud
threat perception
system security risk early warning
privacy protection method
physical level
interface layer
big data security
Application Layer
Scalability
cloud platform
security of data
Cloud Security
Metrics
blockchain
data layer
Data Security
Big Data
Cloud Computing
data privacy
Resiliency
pubcrawl
biblio
Intelligent Architecture and Hybrid Model of Ground and Launch System for Advanced Launch Site
Submitted by aekwall on Mon, 06/01/2020 - 9:53am
Physical layer
internetworking
landing area
launch processes
launch system
launch systems
launch vehicle
middleware
middleware security
network layer
perception layer
Internet of Things
physical objects
policy-based governance
pubcrawl
resilience
Resiliency
security of data
sensors
Space vehicles
test operation
intelligent analysis assessment system
aerospace control
Application Layer
architectural framework
automatic control system crossing
Cloud Computing
command and control systems
composability
data processing system
flight payloads
advanced launch site system
intelligent architecture
intelligent command
intelligent control
intelligent elements
intelligent flight
intelligent functional architecture
intelligent launching region
intelligent system model
intelligent technical area
biblio
Trustworthiness Optimization of Industrial Cluster Network Platform Based on Blockchain
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
Information services
trustworthiness optimization
trustworthiness
Trusted Computing
smart contracts
small-to-medium enterprises
small and medium-sized enterprises
security of data
pubcrawl
optimization
optimisation
network platform
information trustworthiness
Analytical models
information service platform
Industries
industrial cluster network platform
industrial cluster
Economics
Distributed databases
data layer
composability
collaboration
blockchain
Application Layer
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
Proposal of GRPC As a New Northbound API for Application Layer Communication Efficiency in SDN
Submitted by grigby1 on Fri, 02/08/2019 - 3:10pm
APIs
Application Layer
Compositionality
gRPC
Northbound API
pubcrawl
resilience
Resiliency
REST API
SDN
biblio
Embedding of MRC in TM to increase the security for IoT technologies
Submitted by grigby1 on Fri, 02/02/2018 - 12:17pm
wireless sensor networks
Wireless communication
TM (trust management)
sensors
security Algorithm
security
Resiliency
pubcrawl
MRC (maximum ratio diversity)
Metrics
IoT (internet of things) system
internet
embedded systems
diversity reception
composability
Application Layer
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 12:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
1
2
next ›
last »