Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Denial of Service attacks
biblio
Secure Public Key Regime (SPKR) in vehicular networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
lower authentication delay
vehicular networks
vehicles
secure public key regime
Schnorr signature
road side units
public key cryptography
Public key
pubcrawl170109
preauthentication mechanism
mobile radio
authentication
digital signatures
Denial of Service attacks
denial of service attack
delegated trusted authorities
Computer crime
complex certificate verification process
Collusion Attacks
collusion attack
certificate-less PKI
certificate revocation list
biblio
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
network layer attacks
wireless sensor networks
wireless mesh routing protocol
wireless mesh networks
wireless mesh network
Wireless communication
security
Routing protocols
Routing Protocol
Routing
pubcrawl170109
Ambient Assisted Living
IoT-based ambient assisted living applications
Internet of Things
eHealthcare
DoS attacks
Denial of Service attacks
denial of service
data packet delivery ratio
computer network security
Computer crime
biblio
Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing
Submitted by BrandonB on Thu, 04/30/2015 - 1:22pm
DoS attack
training dataset quality
Training
online services
numeric to binary preprocessing method
Numeric to Binary preprocessing
normalization preprocessing methods
KDD 99 dataset
Intrusion Detection Systems
intrusion detection system
Intrusion Detection
IDS
fuzzy set theory
fuzzification preprocessing methods
Accuracy
distributed denial of service attack detection
discretization preprocessing methods
detection accuracy
Denial of Service attacks
denial of service attack
Decision trees
DDoS Attack
Data preprocessing
Data mining
CPU utilization
computer network security
Computer crime
Bayes methods
« first
‹ previous
1
2
3