Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack prevention
biblio
Performance Analysis of DDoS Mitigation in Heterogeneous Environments
Submitted by grigby1 on Thu, 06/22/2023 - 2:10pm
DDoS
Intelligent Transport Systems
attack prevention
DDoS Attack Prevention
Attack detection
Resiliency
denial-of-service attack
computer networks
Performance analysis
Compositionality
information security
VANETs
composability
telecommunication traffic
Computational modeling
Protocols
resilience
Metrics
pubcrawl
machine learning
biblio
Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
logic architecture
software-defined network
software defined networking
Software
Servers
security
SDN network
Resiliency
resilience
pubcrawl
Metrics
malicious packet
logic network
Adaptive Intrusion Prevention System
IPS
IP networks
intrusion prevention system
host attacks
fuzzy set theory
Fuzzy logic
computer network security
computer architecture
attacker host
attack prevention
adaptive systems
adaptive IPS
biblio
Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
attack prevention
Compositionality
MANET
Metrics
pubcrawl
QoS
resilience
Resiliency
System Level
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
Jellyfish attack detection and prevention in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
JF reorder attack
telecommunication security
signal processing
sensors
security
Resiliency
resilience
pubcrawl
Protocols
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
attack prevention
JF periodic dropping attack
JF delay variance attack
JF attack delay data packets
Jellyfish Delay Variance Attack (JFDV)
jellyfish attack prevention
jellyfish attack detection
Jellyfish Attack
DoS attack
delays
Conferences
Compositionality
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
individual security systems
utility-privacy tradeoff curve
two-layer single-leader multifollower game
specific security actions
sophisticated attack techniques
security of data
Security Heuristics
security entities
Scalability
Resiliency
pubcrawl
privacy-sensitive entities
privacy-aware collaborative security
privacy
predictability
optimal collaboration strategies
anticipated information exchange
Heuristic algorithms
Games
game-theoretic approach
game theory
Electronic mail
data privacy
Computing Theory
Computer crime
collaborative security schemes
collaborative security
collaborative entities
collaboration
Byzantine entities
attack prevention
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
1
2
next ›
last »