Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
denial of service attack
biblio
Secure Storage System Using Cryptographic Techniques
Submitted by grigby1 on Fri, 04/14/2023 - 4:08pm
denial of service attack
random password
honey encryption
Brute Force Attack
passwords
brute force attacks
user interfaces
storage system
DoS
hashing
Force
encryption
real-time systems
security requirements
Databases
internet
policy-based governance
Human Factors
Human behavior
pubcrawl
collaboration
biblio
MACHINE LEARNING ALGORITHMS AND THEIR APPLICATIONS IN CLASSIFYING CYBER-ATTACKS ON A SMART GRID NETWORK
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Virtual machining
NSL-KDD data set
Hybrid SVM
Detecting Cyberat-tacks
denial of service attack
virtual machine security
FDIA
cyber physical systems
Distributed databases
resilience
Cryptography
real-time systems
composability
SVM
telecommunication traffic
Radio frequency
Resiliency
pubcrawl
Support vector machines
machine learning algorithms
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
A Moving Target Approach for Securing Secondary Frequency Control in Microgrids
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
inverter-based DG
cyber attack
DoS attacks
power generation control
denial of service attack
Cyber Dependencies
frequency control
Inverters
invertors
cyber attack threats
denial of service
Markov process
microgrid control systems
microgrid secondary frequency control
Moving Target
moving target approach
reactive defense approaches
secondary control
small-signal model
Load modeling
Scalability
Conferences
Resiliency
pubcrawl
Metrics
Decision Making
power engineering computing
power system security
control systems
computer network security
sensor data
distributed power generation
Microgrids
power generation scheduling
Human Factors
Markov processes
communication links
Compositionality
biblio
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
Modbus-TCP vulnerability
Industrial Control Systems
industrial firewall
Information Assurance
Intrusion Detection
Intrusion Detection and Prevention System
IP networks
malicious parameter command injection
Modbus TCP/IP protocol
industrial control and automation system security
Modbus/TCP
prevention systems
pubcrawl
real-time communication
refinery control
Scalability
transport protocols
DPI industrial firewall
Resiliency
composability
Predictive Metrics
attack mitigation
command injection attacks
deep packet inspection
denial of service attack
DPI capabilities
Networked Control Systems Security
firewalls
gas turbine operation
IDPS
IDPS-Snort
industrial automation control system
industrial automation control systems
industrial control
biblio
Run Time Mitigation of Performance Degradation Hardware Trojan Attacks in Network on Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:30pm
hardware trojan
Trojan horses
system-on-chip
semiconductor design
security
run time mitigation
performance degradation Hardware Trojan attacks
NoC
network-on-chip
multiprocessor system on chips
multiprocessing systems
MPSoC
microprocessor chips
integrated circuit design
performance evaluation
Router Architecture
pubcrawl
hardware security issues
Hardware
denial of service attack
Degradation
Cryptography
cryptographic modules
computer architecture
Buffer storage
bit shuffling mechanism
Metrics
resilience
Resiliency
Scalability
network on chip security
biblio
Bandwidth Allocation Strategy of Networked Control System under Denial-of-Service Attack
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
Metrics
time-constrained DoS attack
Stability criteria
security
Resiliency
resilience
pubcrawl
Networked Control Systems Security
networked control systems
networked control system (NCS)
Networked Control System
NCS communication channel
Bandwidth
Dynamic scheduling
Dynamic Networks and Security
dynamic bandwidth allocation structure
dynamic bandwidth allocation
denial-of-service attack
denial of service attack
control systems
computer network security
composability
Channel allocation
bandwidth allocation
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
SDN
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
Mathematical model
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
Adaptive immune system
layer immune inspired framework
Innate immune system
Immune system
human immune system
dynamic network threats
DoS mitigation
DoS flooding attacks
denial of service attack
data layer
control layer
computer network security
biologically inspired architecture
Biologically Inspired
bio-inspired framework
adaptive layer
biblio
Modelling, analysis and design of active queue management to mitigate the effect of denial of service attack in wired/wireless network
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Metrics
wireless sensor networks
wireless network
wired network
Time delay
telecommunication congestion control
TCP/AQM system
stochastic systems
stabilizing control syntheses
stability
Router Systems Security
Resiliency
resilience
queue router attacks
pubcrawl
active queue management
Markovian jump linear system
Linear systems
Guaranteed cost approach
feedback control
distributed denial of service attacks
denial of service attack
delays
delay-dependent conditions
DDoS Attacks
Congestion Control
computer network security
closed-loop system
closed loop systems
AQM security
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
1
2
3
next ›
last »