Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DoS
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and Mitigations
Submitted by grigby1 on Fri, 03/31/2023 - 11:28am
DDoS
bitcoin security
elliptic curve digital signature algorithm
Human Factors
cryptocurrency
DoS
Online banking
bitcoin
Resistance
blockchain
quantum computing
Computers
Protocols
Scalability
Conferences
Human behavior
pubcrawl
biblio
Exploit Security Vulnerabilities by Penetration Testing
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
DoS
White Box Test
Penetration Testing
Hashcat
dark web
Black Box Test
White Box Security
Kali Linux
Companies
DDoS
security
composability
Resiliency
Metrics
pubcrawl
information technology
Conferences
Computer hacking
computer networks
biblio
D3: Detection and Prevention of DDoS Attack Using Cuckoo Filter
Submitted by grigby1 on Wed, 04/13/2022 - 2:54pm
Metrics
DDoS Attack Prevention
OSI
Cuckoo filter
DoS
Information filters
Bloom filter
DDoS
denial-of-service attack
Economics
cloud
Support vector machines
SDN
Floods
composability
Computational modeling
Data models
Resiliency
resilience
Human behavior
pubcrawl
biblio
Performance Analysis on Denial of Service attack using UNSW-NB15 Dataset
Submitted by aekwall on Fri, 04/01/2022 - 2:07pm
Intrusion Detection
feature extraction
pubcrawl
Resiliency
cyberattack
Compositionality
Performance analysis
malware
network security
Predictive Metrics
information management
scientific computing
DoS
filtering theory
UNSW-NB15
Scientific Computing Security
biblio
Serial and Parallel based Intrusion Detection System using Machine Learning
Submitted by grigby1 on Fri, 03/25/2022 - 11:45am
intrusion detection schemes
U2R
Swarm Intelligence
Support vector machines
security
RBF
R2L
PSO-SVM
Probe
privacy
machine learning
IDS
Intrusion Detection
DoS
Compositionality
Clustering algorithms
Classification algorithms
C-mean clustering
composability
Resiliency
pubcrawl
biblio
Predicting Cyber Attacks in a Proxy Server using Support Vector Machine (SVM) Learning Algorithm
Submitted by aekwall on Wed, 03/23/2022 - 9:21am
Predictive Metrics
vector
support
server
proxy
machine
learning
Computers
programming
security
Prediction algorithms
DoS
composability
Resiliency
pubcrawl
Servers
Support vector machines
Task Analysis
biblio
Combating DDoS Attacks with Fair Rate Throttling
Submitted by aekwall on Mon, 03/14/2022 - 1:45pm
collaboration
Mathematical model
internet
pubcrawl
Resiliency
DoS
DDoS
resource management
Predictive Metrics
denial-of-service attack
process control
Communication channels
Rate Adjustment
Router Throttle
Router Systems Security
biblio
A Robust Support Vector Machine Based Auto-Encoder for DoS Attacks Identification in Computer Networks
Submitted by aekwall on Mon, 01/10/2022 - 12:52pm
intrusion detection system
Support vector machines
support vector machine classification
Scalability
Resiliency
real-time systems
pubcrawl
Predictive Metrics
machine learning
threat vectors
Intrusion Detection
Human behavior
feature extraction
DoS
computer networks
Computational modeling
composability
Attack vectors
biblio
DoS Vulnerability Verification of IPSec VPN
Submitted by aekwall on Tue, 10/12/2021 - 3:08pm
IP networks
privacy
Servers
encryption
pubcrawl
composability
Compositionality
Routing protocols
policy-based governance
DoS
IKEv1 protocol
IPsec VPN
OSPF protocol
route spoofing
Virtual private networks
protocol verification
1
2
3
4
5
next ›
last »