Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
firewalls
biblio
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats
Submitted by grigby1 on Thu, 03/28/2019 - 3:15pm
defense strategies
signature based defense
tagging
suspicious information
signature-based antivirus systems
refinable attack investigation framework
realworld attack dataset
RAIN framework
optimal adversary
nonadversarial information tracking
multistage game
memory overhead
information flow passes
dynamic information flow tracking games
DIFT games
security
adversarial information flows
Resiliency
Cyber Attacks
firewalls
Stochastic processes
game theory
Scalability
pubcrawl
Monitoring
resilience
Games
Computational modeling
Analytical models
security of data
biblio
A scalable and flexible DDoS mitigation system using network function virtualization
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
scalable dispatcher
IP networks
legitimate traffic
metric
network function virtualization
Network Function Virtualization architecture
online websites
pubcrawl
Resiliency
Scalability
scalable DDoS mitigation system
Human behavior
Scalable routing
Servers
SYN flood attack
target server
telecommunication traffic
third-party cloud-based DDoS
threat mitigation
virtual network agents
virtualisation
distributed denial of service
attack traffic
batching forwarding
bucket-based forwarding mechanism
Cloud Computing
Computer crime
computer network security
DDoS defense framework
DDoS defense solutions
ddos mitigation
Dispatching
agent addition
distributed denial of service attacks
dropping rate
enterprise networks
excessive traffic delay
firewall
firewalls
flexible DDoS mitigation system
flexible dispatcher
highly flexible solutions
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Challenges and Preparedness of SDN-based Firewalls
Submitted by grigby1 on Mon, 01/21/2019 - 12:18pm
network manageability
Vulnerability Management
virtualization privacy
surveys and overviews
software defined networking
security and privacy
sdn based firewall
Resiliency
pubcrawl
privacy
OpenFlow protocol
OpenFlow
network security
Access Control
Metrics
Human behavior
header space analysis
flow control
firewalls
data plane
data centers
data center networks
control plane
Conflict Resolution
conflict detection
composability
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection
privacy
program testing
pubcrawl
Regular Expression Inference
Resiliency
search problems
software maintenance
SQL
Policy-Governed Secure Collaboration
SQL Injection attacks
testing
vulnerabilities detection
vulnerable WAFs
WAF rule set
web application firewalls
Web application firewalls repair
web security
Human behavior
collaboration
combinatorial mathematics
combinatorial optimisation problem
Decision trees
filter rules
firewalls
Firewalls (computing)
genetic algorithms
Automated Testing
internet
learning (artificial intelligence)
legitimate requests
machine learning
multiobjective genetic algorithms
Policy
policy-based governance
biblio
MalFire: Malware firewall for malicious content detection and protection
Submitted by K_Hooper on Wed, 04/04/2018 - 10:00am
malicious content protection
Web servers
vulnerability detection
user data security
user data privacy
tools
sensitive information
security
Resiliency
pubcrawl
privacy
online portion
Metrics
malware injection
malware firewall
malware
ad blocking tool
malicious content detection
MalFire
IP networks
invasive software
internet
Human behavior
firewalls
data privacy
Content Injection
contemporary threats
Compositionality
Companies
adware injection
adware content
Adware
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
biblio
APT Attack Behavior Pattern Mining Using the FP-Growth Algorithm
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
host PC security technologies
signature-based intrusion detection systems
Scalability
Resiliency
resilience
pubcrawl
PE files
Pattern Mining
pattern matching
Metrics
malware
Intrusion Detection
Human behavior
advanced persistent threat attacks
FP-growth algorithm
firewalls
digital signatures
Data mining
Conferences
Cancer
APT attack behavior pattern mining
APT attack
application program interfaces
API files
advanced persistent threats
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chain verification
security chains
security functions
model checking
smart devices
SMT
software defined networking
software-defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
« first
‹ previous
1
2
3
4
5
next ›
last »