Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security problems
biblio
Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Networked Control Systems Security
water power generation industrial control network
smart power grids
Servers
security risk control
security
Scalability
Resiliency
resilience
pubcrawl
Predictive Metrics
Protocols
power system security
power engineering computing
open network
network security problems
attack and defense map
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control network system
industrial control
hydroelectric power stations
Hydroelectric power generation
Hazards
future hydroelectric power generation system
defense strategy
dedicated network
Databases
computer network security
composability
Communication networks
biblio
Overview of Botnet Detection Based on Machine Learning
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
Metrics
Servers
security industry
security
Resiliency
resilience
pubcrawl
protection detection
network space security
network security problems
network security
network equipment
botnet
machine learning
learning (artificial intelligence)
invasive software
information industry
feature extraction
Data models
Compositionality
complex network environment
Communication networks
botnets
Botnet detection
biblio
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 12:15pm
IP networks
traffic control component
traffic control
traceback-based defense
trace back component
telecommunication traffic
TDFA
spoofed IP addresses
quality of service
Protocols
packet forwarding rate
packet filtering
network security problems
IP Traceback
attack packets
internet
Image edge detection
Filtering
distributed denial of service attack
Deterministic Flow Marking
detection component
DDoS flooding attacks
DDoS Attack
computer network security
Computer crime
Bandwidth
attacking traffic