Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attack
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
Detection of DDoS Attack and Classification Using a Hybrid Approach
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
hybrid feature selection method
Classifiers.
cross-validation
DDoS category
DDoS detection
DDoS detection rate
decision table
discretize dataset
Feature Selection
Bayes Net classifiers
J48 classifier
KDD DDoS dataset
Naive Bayes Classifiers
naive Bayes methods
NSL DDoS dataset
NSL KDD dataset
selected DDoS packets
weka tool
computer network security
security of data
Cloud Computing
machine learning
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
random forests
composability
pattern classification
Random Forest
Cloud Security
machine learning classifiers
DDoS Attack
DDoS attack detection
biblio
A Comprehensive Approach for DDoS Attack Detection in Smart Home Network Using Shortest Path Algorithm
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
composability
smart home network
shortest path algorithm
machine learning algorithms
Graph Algorithm
distributed denial of service attack
Defence Mechanism
DDoS attack detection
home computing
DDoS Attack
Smart homes
Time factors
feature extraction
Computer crime
telecommunication traffic
Protocols
network security
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
DDoS Attack Detection and Mitigation at SDN Data Plane Layer
Submitted by grigby1 on Tue, 02/16/2021 - 12:57pm
SDN specifications
programming
pubcrawl
Python
quality of service
resilience
Resiliency
SDN
SDN data plane layer
SDN data-plane
SDN environment
OpenFlow
Servers
Software
software defined networking
software-defined networking
Switches
telecommunication traffic
time 100.0 s to 150.0 s
virtualisation
written SDN application
forwarding plane
Automated Secure Software Engineering
centralized control point
composability
computer network security
control plane
DDoS Attack
DDoS attack detection
denial-of-service attack
distributed denial-of-service attack
DDoS attack mitigation
Human behavior
malicious traffic abnormal behavior
Metrics
network functions
network infrastructure
normal traffic
open daylight controller
Open vSwitch programmability feature
Opendaylight
biblio
Improving Performance of Collaborative Source-Side DDoS Attack Detection
Submitted by grigby1 on Tue, 02/16/2021 - 12:57pm
false positive rate
weighted detection results
telecommunication traffic
source-side detection
source-side Denial-of-Service
security
SDN IDPS
Resiliency
resilience
pubcrawl
network security
Metrics
individual attack detection
Human behavior
collaboration
distributed denial-of-service attacks
detection methods
detecting performance
denial-of-service attack
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
Communication networks
Collaborative Source-side detection
collaborative source-side DDoS attack detection method
collaborative attack detection technique
biblio
TVis: A Light-weight Traffic Visualization System for DDoS Detection
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
pubcrawl
low-rate attacks
microsoft windows
Monitoring
network defenders
network size
network traffic
networked computers
offline modes
online and offline
light-weight traffic visualization system
resilience
Resiliency
telecommunication traffic
time 5.0 s
triangle-area
TVis
undirected graph
visual observations
visualization
external network traffic
anomaly detection system
Computer crime
computer network security
Computing Theory
data visualisation
Data visualization
DDoS Attack
denial-of-service attack
distributed DoS attacks
acute attacks
graph theory
Heron's triangle-area mapping
high-rate DDoS detection
highrate DDoS attacks
interactive visualization system
internal network traffic
internet
IP networks
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
security orchestration platform
ontology-driven approach
open systems
Organizations
pubcrawl
Resiliency
SecOrP
security of data
security orchestration
Ontology
security software systems
security system
security systems integration processes
Semantics
Snort
Splunk
Task Analysis
DDoS Attack
Human behavior
Expert Systems and Security
Australia
automated integration process
Automated Response Actions
composability
Computer crime
cybersecurity attacks
Scalability
distributed denial of service attacks
incident response process
interoperability
Limacharlie
OnSOAP
Ontologies
ontologies (artificial intelligence)
biblio
BcIoT: Blockchain based DDos Prevention Architecture for IoT
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
Distributed databases
smart things
smart contract security
self-configuring things
IoT technologies
Internet of Thing (IoT)
hash based secret key
DDoS prevention
data consistency
centralized system
BcIoT
DDoS Attack Prevention
DDoS Attack
blockchain technology
contracts
Computer crime
blockchain
Metrics
composability
pubcrawl
Human behavior
Resiliency
computer architecture
data integrity
private key cryptography
Internet of Things
Conferences
data privacy
Data Security
computer network security
biblio
DDOS Defense Strategy in Software Definition Networks
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
DDoS
victim defense strategy
ubiquitous situation
software definition network
Software Definition
social life
network society
network economy
military life
distributed defense strategy
distributed defense strategies
defense strategy
DDOS defense strategy
DDoS Attack
cultural life
DDoS Attack Prevention
Computer crime
denial-of-service attack
intermediate network
computer viruses
attack
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
network security
software defined networking
IP networks
computer network security
« first
‹ previous
1
2
3
4
5
6
next ›
last »