Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attack
biblio
Prevention of DDoS attacks in cloud environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
endowment technological data
utility computing
touchy data
Science of Security
Scalability
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Human Factors
Human behavior
honeypot
Handheld computers
gigantic curiosity
Big Data
distributed denial of service
distributed computing
DDoS Defence procedures
DDoS Attack Prevention
DDoS Attack
computer network security
computational intelligence
computational assets
composability
collaboration
cloud services
cloud environment
Cloud Computing
biblio
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks
Submitted by grigby1 on Wed, 05/17/2017 - 1:57pm
controller area network security
controller area networks
DDoS Attack
distributed and decentralized coordination
Internet of Things
Internet of Things (IoT)
Kalman filter
pubcrawl
pulsating attack
Resiliency
biblio
DDoS attacks and countermeasures in cyberspace
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Filtering
Vulnerability
transport protocols
TCP-IP model
Servers
pubcrawl170109
Protocols
mitigation
IP networks
internet
Floods
Computer crime
distributed denial of service attacks
DDoS Defense
DDoS attack mechanisms
DDoS Attack
Cyberspace
cyber-attack
cyber security
computer networks
computer network security
biblio
"Detecting Security Threats Using Mobile Devices"
Submitted by abfox on Tue, 02/14/2017 - 2:30pm
Monitoring
telecommunication traffic
Servers
security threats detection
security threat detection
security of data
security
pubcrawl170101
Ports (Computers)
performance escalation
advanced persistent threat
Mobile handsets
mobile devices
mobile computing
distributed denial-of-service
DDoS Attack
Data collection
covering array
combinatorial testing
advanced persistent threats
biblio
Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing
Submitted by BrandonB on Thu, 04/30/2015 - 1:22pm
DoS attack
training dataset quality
Training
online services
numeric to binary preprocessing method
Numeric to Binary preprocessing
normalization preprocessing methods
KDD 99 dataset
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
IDS
fuzzy set theory
fuzzification preprocessing methods
Accuracy
distributed denial of service attack detection
discretization preprocessing methods
detection accuracy
Denial of Service attacks
denial of service attack
Decision trees
DDoS Attack
Data preprocessing
Data mining
CPU utilization
computer network security
Computer crime
Bayes methods
biblio
Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
distributed denial-of-service attacks
thermal properties
Temperature distribution
Servers
server downtime prevention
power aware computing
network simulation
network management protocols
Monitoring
HVAC systems
HVAC
heating-ventilation-and-air-conditioning systems
Heating
Cloud Computing
defense strategies
DDoS Attack
Data models
data center meltdown
Data center communications
Cooling
computer network security
computer network management
Computer crime
computer centres
cloud services
biblio
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
IP networks
traffic control component
traffic control
traceback-based defense
trace back component
telecommunication traffic
TDFA
spoofed IP addresses
quality of service
Protocols
packet forwarding rate
packet filtering
network security problems
IP Traceback
attack packets
internet
Image edge detection
Filtering
distributed denial of service attack
Deterministic Flow Marking
detection component
DDoS flooding attacks
DDoS Attack
computer network security
Computer crime
Bandwidth
attacking traffic
biblio
An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC)
Submitted by BrandonB on Thu, 04/30/2015 - 1:11pm
Cloud Computing
DDoS Attack
ICMP Flood
IDS
IDSServer
Saa SCloud
SIDSCC
« first
‹ previous
1
2
3
4
5
6