Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Flooding Attacks
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
Intrusion Detection
wrapping attacks
Virtual machining
specific honey pot algorithm
Servers
security issues
security
Scalability
Resiliency
resilience
pubcrawl
procedural intrusion way
malware
invasive software
Intrusion Detection Systems
Browser Security
intrusion
Human Factors
Human behavior
honey pots
honey pot attack
Honey pot (computing)
Honey Pot
Flooding Attacks
common security breaches
cloud computing security attacks
Cloud Computing
browser malware-injection attacks
authentication
attacks
biblio
Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Technology management
MANET Attack Detection
security attack
portable hubs
performance measure techniques
Packet loss
network parameters
mobile hubs
mobile ad-hoc network
MANETSs
inactive attack
Dynamic attack
detection anatomization
decentralized validation
security
mobile computing
automation
mobile ad hoc networks
MANETs
Flooding Attacks
Compositionality
Routing protocols
Ad hoc networks
telecommunication security
Resiliency
resilience
Metrics
pubcrawl
biblio
Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 2:54pm
internet
Scalability
safety hazard
Resiliency
resilience
rapidly volatile attacks
pubcrawl
network security
Named Data Network Security
named data network
malicious interest packets
IP-based networks
IP networks
Internet architecture
Bandwidth
information-centric networking
IFA countermeasures
IFA attackers
Human behavior
Fluctuations
Flooding Attacks
Entropy
DoS attacks
detection accuracy
computer network security
computer architecture
channel capacity
biblio
DDoS Attacks on the Internet of Things and Their Prevention Methods
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
botnets
composability
DDoS Attack Prevention
Distributed Denial of Service (DDoS)
Flooding Attacks
Human behavior
information security
Internet of Things (IoT)
Metrics
network functions virtualisation (NFV)
pubcrawl
resilience
Resiliency
software defined networking (SDN)
technology
virtualisation
biblio
Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:51am
mobility management
WMN
wireless mesh networks
vehicular networks
telecommunication security
technological convergence
security
secure mobility scheme
packet delivery ratio
network access
negative effects
Monitoring
mobility management (mobile radio)
ARP packets flooding
Mobility
Mobile radio mobility management
MIRF
malicious ARP requests
IP networks
internet
infrastructure-based vehicular networks
handoffs
Floods
flooding attacks mitigation
Flooding Attacks
Filtering