Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Chained Attacks
biblio
Defences Against web Application Attacks and Detecting Phishing Links Using Machine Learning
Submitted by aekwall on Fri, 07/01/2022 - 8:47am
Classification algorithms
Chained Attacks
Web application
PHP and MySQL
long short term memory networks
logistic regression
Apache access Logs
server
application security
support vector machine
Random Forest
Phishing
Support vector machines
attacks
cyber security
Training data
machine learning
Resiliency
Scalability
pubcrawl
machine learning algorithms
Training
deep learning
biblio
Distributed Control for Nonlinear Multi-Agent Systems Subject to Communication Delays and Cyber-Attacks: Applied to One-Link Manipulators
Submitted by aekwall on Fri, 07/01/2022 - 8:46am
simulation
delays
pubcrawl
Scalability
Resiliency
sufficient conditions
Quantization (signal)
Stability analysis
communication delays
cyber-attacks
Decentralized Control
manipulators
Nonlinear Multi-Agent
Single-Link Manipulators
Chained Attacks
biblio
Filtration method of DDoS attacks based on time-frequency analysis
Submitted by aekwall on Fri, 07/01/2022 - 8:46am
Chained Attacks
Conferences
DDoS Attacks
denial-of-service attack
Filtering
filtering algorithms
Filtering method
Fourier transform
pubcrawl
Resiliency
Resists
Scalability
Throughput
Time-frequency Analysis
wavelet transform
Wigner-Ville method
biblio
Adversarial Attacks on Deep Learning Based Power Allocation in a Massive MIMO Network
Submitted by aekwall on Fri, 07/01/2022 - 8:46am
deep learning
Perturbation methods
tools
Wireless communication
pubcrawl
Scalability
Resiliency
Artificial Neural Networks
resource management
wireless security
Neural networks
adversarial attacks
precoding
massive MIMO
power allocation
Chained Attacks
biblio
Self-organizing Software Defined Mesh Networks to Counter Failures and Attacks
Submitted by aekwall on Fri, 07/01/2022 - 8:45am
Mesh networks
Chained Attacks
Self-MIDAS
sFlow-RT
sFlow Collector
sFlow Agent
Policy Based Flow Management (PBFM)
flow tables
DDoS Attacks
Attack Detection and Mitigation
SDN
network architecture
automation
denial-of-service attack
telecommunication traffic
Manuals
Redundancy
Resiliency
Scalability
pubcrawl
biblio
A Blockchain Based Link-Flooding Attack Detection Scheme
Submitted by aekwall on Fri, 07/01/2022 - 8:45am
blockchain
internet
Intrusion Detection
Conferences
pubcrawl
Scalability
Resiliency
denial-of-service attack
information management
Floods
distributed detection
LFA
Traceroute
Chained Attacks
biblio
Link Latency Attack in Software-Defined Networks
Submitted by aekwall on Fri, 07/01/2022 - 8:45am
Training
real-time systems
machine learning
Switches
pubcrawl
Scalability
Resiliency
Topology
wireless networks
network topology
fabrication
Link Fabrication Attack
Link Latency
Software-defined networking (SDN)
Topology Poisoning
Chained Attacks
biblio
Analysis of Eavesdropping Attacks on Terahertz Links propagating through Atmospheric Turbulence
Submitted by aekwall on Fri, 07/01/2022 - 8:44am
wireless sensor networks
Wireless communication
pubcrawl
Scalability
Resiliency
Receivers
Atmospheric modeling
Sensitivity
Atmospheric measurements
Scattering
Chained Attacks
biblio
Fault-tolerance to Cascaded Link Failures of Video Traffic on Attacked Wireless Networks
Submitted by aekwall on Fri, 07/01/2022 - 8:44am
Pandemics
Chained Attacks
wireless network
Traffic.
Routing Video
Link failure
Fraudulent Attacks
Fault-Tolerance
Enhanced Genetic Algorithm
delays
wireless networks
Fault tolerant systems
fault tolerance
Resiliency
Scalability
pubcrawl
Bandwidth
Routing
biblio
A Link Flooding Attack Detection Method based on Non-Cooperative Active Measurement
Submitted by aekwall on Fri, 07/01/2022 - 8:44am
Indexes
Routing
Protocols
pubcrawl
Scalability
Resiliency
denial-of-service attack
Interference
Time measurement
Attack detection
Floods
DDoS Attack
network measurement
non-cooperative
Chained Attacks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »