Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP
biblio
Connection-Free Reliable and Efficient Transport Services in the IP Internet
Submitted by grigby1 on Wed, 08/11/2021 - 4:03pm
Proposals
transport protocols
TCP
Resiliency
resilience
Reliability engineering
Reliability
pubcrawl
Protocols
collaboration
policy-based governance
NDN
ip privacy
IP networks
IP
internet
connections
composability
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
Histograms
uncertainty
telecommunication traffic
service attacks
security
Resiliency
resilience
pubcrawl
nonattack traffic
Metrics
IP networks
IP
Intrusion Detection
Internet technologies
internet
Anomaly Detection
graphics-based features
graph based features
fuzzy relevance function
Fuzzy logic
fuzzy clustering
Entropy
detection stage
DDoS intrusion detection approach
DDoS detection algorithm
DDoS detection
Cyber Physical System
computer network security
Computer crime
attack traffic
biblio
MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
programming
microarchitectural attack
microarchitecture
microcomputers
microprocessor chips
MiteS
Multiple Encryption
networked AP SoC platforms
PCS
personal computers
preventive countermeasure
Metrics
Protocols
pubcrawl
resilience
Resiliency
return-oriented programming
return-oriented programming attack
software-based microarchitectural attacks
stack protection
system-on-chip
Computer crime
adapted words addition
all-programmable system-on-chip
AP SoC attacker
AP SoC victim
buffer overflow
Buffer overflow attack
command injection attacks
command-injection
command-injection-based attack
composability
return oriented programming
Cryptography
dynamic reconfiguration
field programmable gate arrays
FPGA dynamic configuration
Intellectual Property cores
internet
Internet Protocol
internetworked all programmable system-on-chip platforms
IP
biblio
P4NIS: Improving network immunity against eavesdropping with programmable data planes
Submitted by grigby1 on Tue, 03/09/2021 - 2:40pm
Servers
P4NIS
packet classification
performance evaluation
policy-based governance
programmable data planes
programming protocol-independent packet processor based network immune scheme
Protocols
pubcrawl
network paths
single network path
supercomputer computational capacity
telecommunication traffic
three lines of defense
traffic packets
transmission port field encryption
versatile attackers
encryption-based countermeasures
brute-force attacks
computer network security
Cryptography
diverse encryption algorithms
eavesdropping
eavesdropping attacks
encrypted packet transmission
encryption
brute force attacks
Human behavior
Human Factors
internet
Internet Protocol
IP
IP networks
network immunity
biblio
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
memory exhaustion minimization
Internet Protocol
IP
IP spoofing detection
IP spoofing prevention
IP2HC table
LAND attack
LAND based DDoS attack
local area network denial attack
malformed packets
hop count filtering mechanism
smurf attack
Source port
spoofed packets
SYN flood attack
teardrop attack
TTL
victim server
virtual cloud environment
internet
Cloud Computing
IP networks
distributed denial of service attack
Resiliency
Human behavior
pubcrawl
composability
Metrics
computer network security
Local area networks
IP spoofing
Flooding Attack
DDoS Attack Prevention
CloudSim 3.0 toolkit
Distributed Denial of Service(DDoS)
HCF mechanism
Hop Count Filtering (HCF)
biblio
Risk analysis of information-leakage through interest packets in NDN
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
malware
Support vector machines
security
search engines
search engine information
Scalability
Resiliency
resilience
pubcrawl
paper performs risk analysis
NDN network
Named-Data Networking
Named Data Network Security
anomalous Interest traffic
IP networks
IP
invasive software
internet
interest packets
Interest names
information-leakage
Human behavior
encoding
Dictionaries
computer network security
biblio
The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijack
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
NDN
transport protocols
Topology
telecommunication network routing
Scalability
Routing protocols
Routing Information Base
Routing
Resiliency
resilience
pubcrawl
network topology
network routing
network architecture design
computer network
named data networking
Named Data Network Security
IPv4
IP router
IP networks
IP
Internet Protocol version 4
internet
Human behavior
hijacked node
forwarding plane
data communication
computer network security
biblio
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event
Submitted by K_Hooper on Wed, 10/25/2017 - 11:50am
anycast
BGP
Cyber Dependencies
DDoS
distributed denial-of-service
Human behavior
IP
Performance
pubcrawl
reachability
resilience
root dns
Scalability
biblio
An Overview of Architectural and Security Considerations for Named Data Networking (NDN)
Submitted by grigby1 on Tue, 09/05/2017 - 1:45pm
architecture
Compositionality
countermeasures
DoS
interest flooding
Internet Protocol
IoT
IP
named data networking
NDN
network security
Network Security Architecture
pubcrawl
Resiliency
wireless