Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
denial of service attack
biblio
A Defense Mechanism for DoS Attacks in SDN (Software Defined Network)
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
Resiliency
software defined networking
Software Defined Network
security threats
security challenges
SDN security
SDN architecture
Scalability
S-FlowRT
computer network management
resilience
pubcrawl
network security
heterogeneous networks
DoS(Denial of Service)
DoS attacks
denial of service attack
computer network security
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
pubcrawl
telecommunication traffic
Software Defined Networks
software defined networking
sFlow-RT
sFlow
security of data
security
SDN security
SDN
Scalability
Resiliency
computer architecture
Protocols
performance aware Software Defined Networking
OpenFlow
Monitoring
Hardware
DoS attack
Denial of Service attacks
denial of service attack
data centers
control systems
computer network security
biblio
A smart city cyber security platform for narrowband networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
narrowband technologies
threat deep learning-based model
smart city cyber security platform
Smart City
smart cities
Sigfox
security of data
Resiliency
resilience
public administration
pubcrawl
Network Security Architecture
NB-IOT
Computer crime
narrowband networks
Narrowband
LoRaWAN
learning (artificial intelligence)
Intrusion Detection
IDS
DoS
denial of service attack
deep learning
Data models
cyber-attack detection
biblio
Security Assessment of Cyberphysical Digital Microfluidic Biochips
Submitted by grigby1 on Wed, 05/17/2017 - 1:27pm
actuator security
composability
cyber physical digital microfludic biochip
denial of service attack
DMFB
DMFB synthesis
dna security
Human behavior
in-vitro
Metrics
pubcrawl
Resiliency
security
tampering
trojan
biblio
Secure Public Key Regime (SPKR) in vehicular networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
lower authentication delay
vehicular networks
vehicles
secure public key regime
Schnorr signature
road side units
public key cryptography
Public key
pubcrawl170109
preauthentication mechanism
mobile radio
authentication
digital signatures
Denial of Service attacks
denial of service attack
delegated trusted authorities
Computer crime
complex certificate verification process
Collusion Attacks
collusion attack
certificate-less PKI
certificate revocation list
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
biblio
Data security in Smart Grid with hardware implementation against DoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
IP networks
SYNflooding
SYN flooding
smart resources
smart power grids
Smart Grid
Servers
secure Web server algorithm
pubcrawl170109
Protocols
power engineering computing
LPC1768 processor
ARM Processor
internet
Hardware Implementation
Floods
DoS attacks
DoS
denial of service attack
Data Security
Cybersecurity
Computers
computer network security
Computer crime
« first
‹ previous
1
2
3
next ›
last »