Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attack Prevention
biblio
BcIoT: Blockchain based DDos Prevention Architecture for IoT
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
Distributed databases
smart things
smart contract security
self-configuring things
IoT technologies
Internet of Thing (IoT)
hash based secret key
DDoS prevention
data consistency
centralized system
BcIoT
DDoS Attack Prevention
DDoS Attack
blockchain technology
contracts
Computer crime
blockchain
Metrics
composability
pubcrawl
Human behavior
Resiliency
computer architecture
data integrity
private key cryptography
Internet of Things
Conferences
data privacy
Data Security
computer network security
biblio
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
memory exhaustion minimization
Internet Protocol
IP
IP spoofing detection
IP spoofing prevention
IP2HC table
LAND attack
LAND based DDoS attack
local area network denial attack
malformed packets
hop count filtering mechanism
smurf attack
Source port
spoofed packets
SYN flood attack
teardrop attack
TTL
victim server
virtual cloud environment
internet
Cloud Computing
IP networks
distributed denial of service attack
Resiliency
Human behavior
pubcrawl
composability
Metrics
computer network security
Local area networks
IP spoofing
Flooding Attack
DDoS Attack Prevention
CloudSim 3.0 toolkit
Distributed Denial of Service(DDoS)
HCF mechanism
Hop Count Filtering (HCF)
biblio
DDOS Defense Strategy in Software Definition Networks
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
DDoS
victim defense strategy
ubiquitous situation
software definition network
Software Definition
social life
network society
network economy
military life
distributed defense strategy
distributed defense strategies
defense strategy
DDOS defense strategy
DDoS Attack
cultural life
DDoS Attack Prevention
Computer crime
denial-of-service attack
intermediate network
computer viruses
attack
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
network security
software defined networking
IP networks
computer network security
biblio
DDOS Attack Detection Prevention in SDN using OpenFlow Statistics
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
DDoS
traffic statistics
Traffic simulation
telecommunication switching
programmable network
packet rate
OpenFlow statistics
network attack
legacy old networks
forwarding rule
forwarding logic
DDoS Attack Prevention
DDoS attack detection
centralized architecture
computer network security
Mininet
Software Defined Network
statistical analysis
SDN
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
distributed denial of service attack
telecommunication traffic
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 11:57am
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
DDoS Botnet Prevention Using Blockchain in Software Defined Internet of Things
Submitted by grigby1 on Wed, 12/18/2019 - 1:47pm
distributed blockchain
telecommunication security
software defined networking
software defined Internet of Things
SDN
Resiliency
resilience
pubcrawl
Metrics
invasive software
Internet of Things
Human behavior
Force
distributed denial of service attacks
botnets
defense perspectives
DDoS botnet prevention
DDoS Attack Prevention
DDoS
control center
computer network security
Computer crime
composability
botnet prevention system
botnet bondage
botnet
blockchain
bitcoin
biblio
IoT Server Availability Considering DDoS-Attacks: Analysis of Prevention Methods and Markov Model
Submitted by grigby1 on Wed, 12/18/2019 - 1:47pm
Metrics
technical diagnostics
storage management
Software
smart business center diagnostics
Servers
server
SBC server protection
SBC network
Resiliency
resilience
Random access memory
pubcrawl
prevention methods
network servers
authentication
Markov processes
Markov model
IoT server availability
Internet of Things
Industrial Internet of Things
Human behavior
encryption
dependability
DDoS-attacks
DDoS-attack
DDoS Attack Prevention
Databases
computer network security
composability
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Detection and Prevention of DoS Attacks on Network Systems
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
network systems
internet
Internet development
IoT
IoT contraptions
malevolent undertaking
masterminded resources
Metrics
mishandled machines
incorporating establishment
Organizations
PC structures
pubcrawl
resilience
Resiliency
Servers
standard action
strike action
DDoS Attack
botnet
Cloud Computing
composability
Computer crime
computer network security
convergence
DDoS
DDoS ambushes
anomalous express
DDoS Attack Prevention
denial
distributed denial of service strike
DoS attacks
flood
Floods
Human behavior
biblio
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
internet
traffic classifier
telecommunication traffic
Servers
Resiliency
resilience
pulse wave type DDoS-attack prevention
pubcrawl
network technologies
Network
Metrics
IP networks
botnet
Human behavior
firewalls
firewall
dpi
DDoS Attack Prevention
DDoS attack detection
DDoS
Computer crime
composability
Communication networks
« first
‹ previous
1
2
3
4
5
6
next ›
last »