Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attack
biblio
Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
routing overhead
DDoS attack mitigation
vehicular ad hoc network
VANETs Security
NS-2
network packet loss
network environment
mobile ad hoc networks
greedy approach
distributed denial of service attacks
attack topology
DDoS Attack
resilience
Attack detection
telecommunication network topology
attack mitigation
network throughput
Throughput
Measurement
telecommunication network routing
Metrics
vehicular ad hoc networks
VANETs
Routing
composability
pubcrawl
Human behavior
DDoS Attacks
computer network security
Computer crime
biblio
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*
Submitted by aekwall on Mon, 09/09/2019 - 10:49am
invasive software
tractable adversarial coupon-collector model
Steady-state
Servers
Scalability
Resiliency
reconnaissance activity
Reconnaissance
pubcrawl
Predictive Metrics
moving target defense
malware
Network reconnaissance
DDoS Attack
current session request intensity
computer network security
Computer crime
cloud proxied multiserver tenant
Cloud Computing
client request load
botnet reconnaissance
botnet
asynchronous moving-target defense
active reconnaissance
biblio
Novel Anomaly Detection and Classification Schemes for Machine-to-Machine Uplink
Submitted by grigby1 on Fri, 03/22/2019 - 1:01pm
Monte Carlo methods
low-false alarm rate
low-volume sophisticated attacks
M2M
M2M emergency
machine-to-machine communications
machine-to-machine networks
machine-to-machine uplink
Measurement
Metrics
modified Canberra distance metric
low-complexity
Monte-Carlo simulations
pubcrawl
resilience
Resiliency
Scalability
sensors
standard information technology systems
terminal device failures
volumetric anomaly detection
emergency scenarios
anomaly detection schemes
big data security
classification schemes
Computer crime
computer network security
cyber-attacks
cyber-vulnerabilities
DDoS Attack
Device failures
distributed denial-of-service attacks
Anomaly Detection
Engines
feature extraction
feature-based detection schemes
general M2M uplink
high false-alarm rate
internet
intrusion detection schemes
IT networks
legitimate M2M connections
biblio
A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Human behavior
virtual honeypot
uncommon attacks
strange vindictive attacks
Servers
Scalability
Resiliency
resilience
pubcrawl
Mitigation and hybrid algorithms
IP networks
intrusion prevention system
Interruption counteractive action framework
Internet Service Providers level
IDS
Human Factors
authority level system attacks
honeypot system
honey pots
Floods
expensive network resources
exceptional security risk
end-clients
distributed denial-of-service attack
digital attacks
detection
DDoS Attacks
DDoS Attack
computer network security
Computer crime
botnet
biblio
Detection of DDoS attack via deep packet analysis in real time systems
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
known attack patterns
telecommunication traffic
Scalability
Resiliency
resilience
real-time systems
real time systems
Radiation detectors
pubcrawl
packet filtering
Monitoring
Libraries
Computer crime
Internet technologies
internet
Filtering
deep packet inspection
deep packet analysis
DDoS Attack
Databases
cyber security
Cyber Attacks
computer network security
biblio
Flooding attack detection and prevention in MANET based on cross layer link quality assessment
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
link layer assessment based flooding attack detection
Topology
telecommunication security
telecommunication network routing
routing table
Routing
Resiliency
resilience
pubcrawl
network topology
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
accurate flooding attack detection
flooding node detection
Flooding Attack
Distributed Denial of Services attack
DDoS Attack
DDoS
cross layer MAC-Network interface
cross layer link quality assessment
Cross layer design
Cross Layer
Computer crime
Compositionality
Attack detection
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime
biblio
DDoS Attack Mitigation in Internet of Things Using Software Defined Networking
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Monitoring
telecommunication traffic
Switches
software defined networking
Software
SDN
sampling-based anomaly detection
Routing
Resiliency
real-time systems
pubcrawl
OpenFlow
network security
ADS
Metrics
IoT systems
Internet of Things
Human behavior
DDoS attack mitigation
DDoS Attack
core networks
computer network security
Computer crime
composability
anomaly detection systems
anomaly detection algorithm
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
« first
‹ previous
1
2
3
4
5
6
next ›
last »