Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP spoofing
biblio
Node Protection using Hiding Identity for IPv6 Based Network
Submitted by grigby1 on Fri, 02/24/2023 - 4:31pm
Policy Based Governance
SHA2
OPNET
IP spoofing
logistic map
RSA
Steganography
Power demand
IPv6
traffic control
Receivers
collaboration
network security
Memory management
composability
Computational modeling
Resiliency
resilience
Metrics
pubcrawl
security
biblio
IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks
Submitted by aekwall on Fri, 02/17/2023 - 9:46am
IP networks
internet
real-time systems
pubcrawl
Resiliency
Routing protocols
Predictive Metrics
denial-of-service attack
Filtering
Router Systems Security
high-speed networks
DDoS Defense
high-speed network
IP spoofing
biblio
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
memory exhaustion minimization
Internet Protocol
IP
IP spoofing detection
IP spoofing prevention
IP2HC table
LAND attack
LAND based DDoS attack
local area network denial attack
malformed packets
hop count filtering mechanism
smurf attack
Source port
spoofed packets
SYN flood attack
teardrop attack
TTL
victim server
virtual cloud environment
internet
Cloud Computing
IP networks
distributed denial of service attack
Resiliency
Human behavior
pubcrawl
composability
Metrics
computer network security
Local area networks
IP spoofing
Flooding Attack
DDoS Attack Prevention
CloudSim 3.0 toolkit
Distributed Denial of Service(DDoS)
HCF mechanism
Hop Count Filtering (HCF)
biblio
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet
Submitted by grigby1 on Tue, 01/21/2020 - 11:09am
collaboration
composability
IP spoofing
ipv6 security
Metrics
policy-based governance
pubcrawl
remediation
resilience
Resiliency
biblio
Prevention and Mitigation of DNS Based DDoS Attacks in SDN Environment
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
IP networks
telecommunication traffic
taxonomy
Software Defined Networks
software defined networking
Servers
SDN environment
SDN
Resiliency
resilience
pubcrawl
Protocols
Metrics
IP spoofing
attack packets
internet
Human behavior
domain name system protocol
DNS protocol
DNS
distributed denial-of-service attack
DDoS Attack Prevention
DDoS Attack
DDoS
computer network security
Computer crime
composability
biblio
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
IP spoofing
vigilant dynamic honeypot
tools
spoofing attack
security of data
security attacks
security
Resiliency
pubcrawl
primary security tool
network security
Metrics
knowledge based systems
Dynamic Networks and Security
IP networks
interpolation
fuzzy systems
Fuzzy logic
Dynamical Systems
Dynamic Fuzzy Rule Interpolation
D-FRI
computer network security
composability
Communication networks
attack identification
ARP Spoofing
biblio
Fog Computing as a Defensive Approach Against Distributed Denial of Service (DDoS): A Proposed Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 3:47pm
captchas
Cloud Computing
computer architecture
Computer crime
DDoS
edge computing
Fog computing
Fog defense
Fog defense architecture
IP networks
IP spoofing
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
biblio
IP Spoofing Detection Using Modified Hop Count
Submitted by BrandonB on Wed, 05/06/2015 - 9:39am
IP address spoofing utilization
testing
statistical analysis
Routing protocols
modified hop count parameter
IP spoofing detection
IP spoofing attacks
IP spoofing
IP networks
Computer crime
internet
hop count filtering technique
hop count filtering
Hop Count
HCF learning phase
Filtering
computer network security
biblio
Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique
Submitted by BrandonB on Thu, 04/30/2015 - 12:21pm
Intermediate System
TTL
Servers
Round Trip Time (RTT)
Receivers
Probabilistic logic
probabilistic hop count filtering
probabilistic HCF techniques
packet filtering
network bandwidth jam
mitigation techniques
MATLAB 7
IP spoofing
IP networks
IP addresses
Broadband communication
information filtering
illegitimate packet filtering
host resources exhaustion
Hop Count Filtering (HCF)
Hop Count
Educational institutions
DPHCF-RTT packet filtering technique
Distributed Probabilistic HCF (DPHCF)
distributed probabilistic HCF
distributed DoS attacks
DDoS
conventional hop count filtering
conventional HCF techniques
computer network security