Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Prevention
biblio
Systematic review on mitigating and preventing DDoS attacks on IoT networks
Submitted by grigby1 on Thu, 06/22/2023 - 2:09pm
Proposals
Prevention
DDoS Attack Prevention
Resiliency
mitigation
denial-of-service attack
MQTT
CoAP
Systematics
Compositionality
Internet of Things
DDoS Attacks
composability
Computer crime
Protocols
resilience
Metrics
pubcrawl
IoT
security
biblio
Preventive Measures of Influencing Factors of Computer Network Security Technology
Submitted by grigby1 on Tue, 03/01/2022 - 4:34pm
computer architecture
Computer industry
computer networks
computer network security
Conferences
data encryption
encryption
influencing factors
Information age
Network Security Architecture
Prevention
Production
pubcrawl
resilience
Resiliency
Security Defense System
biblio
NTIA Releases Minimum Elements for a Software Bill of Materials
Submitted by willirn1 on Fri, 10/22/2021 - 4:30pm
commerce
Cybersecurity
detection
Policy
Prevention
Software
biblio
Development of an Intrusion Detection System Using a Botnet with the R Statistical Computing System
Submitted by grigby1 on Wed, 09/08/2021 - 9:34am
Intrusion Detection
wide area networks
Resiliency
resilience
r
pubcrawl
Prevention
Metrics
malware
Logic gates
Bot
intrusion
Information services
Human behavior
Electronic publishing
detection
DDoS Attack Prevention
composability
botnet
biblio
Proposing Innovative Intruder Detection System for Host Machines in Cloud Computing
Submitted by grigby1 on Thu, 07/08/2021 - 2:25pm
intruder detection system
Virtualization
Virtual machining
virtual machine security
virtual machine
Technological innovation
signature
security
Resiliency
resilience
pubcrawl
Prevention
Intrusion Detection
signature based defense
IDS
host machine
Engines
Cyber Physical System
Cryptography
composability
Cloud Computing
attack
Anomaly
alerts
Scalability
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 12:57pm
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
serious security threat
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
policy-based governance
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
detection
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
access content
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by K_Hooper on Wed, 09/27/2017 - 1:21pm
Ad hoc networks
detection
Human behavior
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
Resiliency
scalabilty
security
tunneling
wormhole attack
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by grigby1 on Wed, 08/02/2017 - 1:40pm
detection
manet attack prevention
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
security
tunneling
wormhole attack