Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transport protocols
biblio
Raising flags: Detecting covert storage channels using relative entropy
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
TCP flag frequency distribution
Receivers
regular traffic data sets
regular traffic packets
relative entropy
Resiliency
ROC curves
Scalability
secret messages
receiver operating characteristic
TCP flag header
TCP/IP network packets
telecommunication traffic
testing
timing
transport protocols
Unix systems
IP addresses
coding schemes
Compositionality
covert channels
covert storage channel
covert storage channels
CSC messages
encoding
Entropy
Anomaly Detection
IP networks
IP pair
network traffic
normal traffic
Protocols
pubcrawl
raising flags
biblio
Review of covert channels over HTTP: Communication and countermeasures
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
message content confidentiality
Uniform resource locators
ubiquitous HTTP message
transport protocols
timing
Technological innovation
Servers
Scalability
Resiliency
Receivers
pubcrawl
Protocols
networks
Browsers
internet
HTTP
detection
data leakage
Cryptography
Cryptographic Protocols
covert information container
covert communication method
covert channels
covert channel
Compositionality
capacity
biblio
IoT based ransomware growth rate evaluation and detection using command and control blacklisting
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Servers
network security
physical devices
pubcrawl
Ransomware
ransomware attacks statistics
ransomware growth rate detection
Resiliency
Scalability
Metrics
statistical analysis
TCP/IP header extraction
TCP/IP traffic
telecommunication traffic
threatening ransomware attacks
transport protocols
Web proxy server
command and control blacklisting
malware
locky ransomware
IP networks
IoT environment
invasive software
internetworking
Internet of Things
internet
encryption
emerging ransomware families
Elliptic curve cryptography
detection using command
cyber-attack threat
Cryptowall ransomware attack detection model
computer network security
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
Linux
Web servers
Web server
UDP DDoS flood cyber attack
transport protocols
Throughput
threshold limit
TCP throughput
security problems
round-trip time
reverse path forwarding
pubcrawl170109
network load balancing
Linux Ubuntu 13
Linux platform
access control lists
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
CPU utilization
Computers
computer network security
Computer crime
authorisation
ACL
biblio
DDoS attacks and countermeasures in cyberspace
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Filtering
Vulnerability
transport protocols
TCP-IP model
Servers
pubcrawl170109
Protocols
mitigation
IP networks
internet
Floods
Computer crime
distributed denial of service attacks
DDoS Defense
DDoS attack mechanisms
DDoS Attack
Cyberspace
cyber-attack
cyber security
computer networks
computer network security
biblio
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
threshold limit
network load balancing
pubcrawl170109
resource allocation
reverse path forwarding
round-trip time
security problems
Servers
TCP throughputs
Load management
threshold limit defense
Throughput
transport protocols
UDP DDoS Attack
UDP DDoS cyber flood attack
Windows Server 2012
Windows Sever 2012
access control lists
Linux Ubuntu 13
Linux
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
cyber security
CPU utilization
computer network security
Computer crime
ACL
biblio
"Detectability of low-rate HTTP server DoS attacks using spectral analysis"
Submitted by abfox on Tue, 02/14/2017 - 2:47pm
hypermedia
transport protocols
Temperature measurement
telecommunication traffic
Spectral analysis
Social network services
Servers
pubcrawl170101
operating systems
network traffic
Low-rate DoS attack
internet
Instruction sets
advanced persistent threat
HTTP server
HTTP 1.1
DoS flooding attacks
DoS attacks
denial-of-service attacks
computer network security
Computer crime
attack simulator
Attack detection
Apache HTTP Server software
Apache HTTP Server
biblio
Practical DCB for improved data center networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
NIC
Vegetation
transport protocols
Topology
Throughput
telecommunication traffic
telecommunication network topology
TCP-bolt
System recovery
switching networks
storage area networking
Routing protocols
Routing
Ports (Computers)
arbitrary network topology traffic
lossless Ethernet
Local area networks
line blocking head
improved data center network
Hardware
ECMP routing
deadlock-free routing scheme
DCB
data center bridging
computer centres
commodity data center switch
buffering delay
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »