Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Blacklist
biblio
Detect Phishing Website by Fuzzy Multi-Criteria Decision Making
Submitted by grigby1 on Fri, 02/03/2023 - 5:22pm
Computer hacking
Neural networks
pubcrawl
Human behavior
Decision Making
Phishing
Uniform resource locators
Cyberspace
Anti-phishing
Costs
Blacklist
Fuzzy MCDM
White-list
biblio
Mitigating HTTP GET FLOOD DDoS Attack Using an SDN Controller
Submitted by grigby1 on Tue, 09/07/2021 - 3:23pm
IP networks
Web servers
Switches
SDN
Resiliency
resilience
pubcrawl
Protocols
Open Flow
Metrics
Blacklist
Human behavior
flow table
Floods
denial-of-service attack
DDOS attacks detection
DDoS attack mitigation
DDoS Attack
Computer crime
composability
biblio
Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks
Submitted by grigby1 on Fri, 03/15/2019 - 11:55am
security
resilience
pubcrawl
Metrics
Resiliency
Scalability
Blacklist
operating performance point
Power management
Time Frequency Analysis
biblio
On the Design of a Simple Network Resolver for DNS Mining
Submitted by grigby1 on Tue, 05/30/2017 - 12:59pm
Alexa
Blacklist
composability
cyber security
Human behavior
Metrics
network latency
NoSQL
pubcrawl
relational database security
Resiliency
whois
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet