Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
service attacks
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
Histograms
uncertainty
telecommunication traffic
service attacks
security
Resiliency
resilience
pubcrawl
nonattack traffic
Metrics
IP networks
IP
Intrusion Detection
Internet technologies
internet
Anomaly Detection
graphics-based features
graph based features
fuzzy relevance function
Fuzzy logic
fuzzy clustering
Entropy
detection stage
DDoS intrusion detection approach
DDoS detection algorithm
DDoS detection
Cyber Physical System
computer network security
Computer crime
attack traffic
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
linear SVM
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
SDN
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
software defined networking
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
security of data
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
biblio
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
SDN
Metrics
Microorganisms
mitigation models
OpenFlow
pubcrawl
resilience
Resiliency
Router Systems Security
Mathematical model
security
service attacks
Software
software defined networking
Switches
telecommunication traffic
Traffic Management
Adaptive immune system
layer immune inspired framework
Innate immune system
Immune system
human immune system
dynamic network threats
DoS mitigation
DoS flooding attacks
denial of service attack
data layer
control layer
computer network security
biologically inspired architecture
Biologically Inspired
bio-inspired framework
adaptive layer
biblio
A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network
Submitted by aekwall on Wed, 12/18/2019 - 2:26pm
internet
traditional network architecture
software-driven network
software-based networks
service attacks
new-machine learning-based collaborative DDoS mitigation mechanism
DDoS mitigation technique
DDoS detection
DDoS attack mitigation
Switches
resilience
Software Defined Network
Attack detection
SDN
Computer crime
Metrics
machine learning
composability
pubcrawl
Human behavior
learning (artificial intelligence)
feature extraction
DDoS Attacks
software defined networking
security
telecommunication security
Servers
computer network security
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
Human Factors
transaction confirmation process
Software
service attacks
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Peer-to-peer computing
peer to peer security
P2P network
network protocol
network message exchanges
Metrics
bitcoin
human factor
Human behavior
distributed denial of service attacks
denial of service
DDoS Attacks
Data mining
Cryptographic Protocols
cryptocurrencies
computer network security
Computer crime
blockchain
Bitcoin peer-to-peer network
bitcoin mining process
bitcoin message exchanges
bitcoin core software
biblio
SDR-Based Resilient Wireless Communications
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
wireless channels
SDR-based resilient wireless communication
security of data
service attacks
session hijacking
software defined radio
Software Defined Radios
software radio
telecommunication security
Scalability
Wireless communication
wireless communications attacks
wireless communications channels
wireless communications secure
wireless networks
wireless protocols
wireless technologies
jamming attacks
Communication system security
Computer crime
cyberattacks
Denial of Service (DoS) Attack
Denial of Service attacks
Frequency modulation
Jamming
jamming attack
Autonomic Security
Metrics
moving target defense
Protocols
pubcrawl
radio channels
Resiliency
Resilient Communication System