Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS
biblio
9-1-1 DDoS: Attacks, Analysis and Mitigation
Submitted by grigby1 on Tue, 01/16/2018 - 6:26pm
Mobile handsets
DDoS attack mitigation
distributed denial of service attack
e911
emergency call centers
emergency services
FCC regulations
firmware
Human behavior
invasive software
Metrics
DDoS
mobile phone Botnet
Object recognition
PSAP
pubcrawl
Resiliency
rootkit
smartphone
TDoS
Terrorism
cellular identifiers
911
911 emergency service
anonymized attacks
anonymized phones
anonymous attacks
Baseband
baseband firmware
botnet
Cellular
9-1-1 DDoS
cellular network protocols
Cellular networks
cellular radio
composability
Computer crime
computer network security
critical infrastructure sectors
critical infrastructures
Cryptographic Protocols
biblio
Detection and prevention of DoS attacks in Software-Defined Cloud networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
Resiliency
IP networks
IPS security
Metrics
network device
network scenarios
OFP
OpenFlow protocol
Protocols
pubcrawl
intrusion prevention system
SDC
SDN
Software Defined Clouds
software defined networking
Software-Defined Networking technology
Switches
SYN flooding attacks
vulnerable attacks
DDoS attack detection
Cloud Computing
Cloud Computing networks
composability
computer network security
control functions
control plane
data plane
DDoS
centralized controller
Denial-of-Service
distributed DoS attacks
distributed Firewall
distributed security mechanism
Firewall and IPS
Firewalls (computing)
Human behavior
ICMP flooding attacks
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
human beings
Servers
security
SDN
pubcrawl
Observers
networks
IP networks
Human Factors
CAPTCHA
Human behavior
delays
DDoS attack mitigation
DDoS
Computer crime
composability
captchas
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
Interconnected Systems
video surveillance
UDP
TCP
Servers
server
resources
Resiliency
pubcrawl
Protocols
Metrics
IP networks
botnets
information security
Human Factors
Human behavior
Floods
distributed denial of service attack
DDoS attack detection strategies
DDoS
computer network security
Computer crime
Cloud Computing
biblio
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event
Submitted by K_Hooper on Wed, 10/25/2017 - 11:50am
anycast
BGP
Cyber Dependencies
DDoS
distributed denial-of-service
Human behavior
IP
Performance
pubcrawl
reachability
resilience
root dns
Scalability
biblio
Moving Target Defense Against DDoS Attacks: An Empirical Game-Theoretic Analysis
Submitted by grigby1 on Mon, 05/22/2017 - 1:48pm
collaboration
composability
Control Theory
DDoS
game theoretic security
game theory
Human behavior
Metrics
moving target defenses
pubcrawl
Resiliency
Scalability
security
biblio
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services
Submitted by grigby1 on Fri, 05/19/2017 - 1:44pm
booter
collaboration
composability
DDoS
Deterrence
Human behavior
Measurement
Metrics
paypal
pubcrawl
Resiliency
Scalability
biblio
Detection of botnet by analyzing network traffic flow characteristics using open source tools
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
pattern classification
fraud
invasive software
IP networks
malware
Mobile Botnet
Mobile communication
network traffic flow characteristics analysis
open source tools
financial threat
payload analysis
payload inspection
Payloads
phishing attack
pubcrawl170109
public domain software
Servers
telecommunication traffic
C&C channels
Bot
bot host classification
Bot master
bot masters
botnet
botnet activity detection
Botnet cloud
botnet detection technique
Bluetooth
click fraud
Computer crime
computer network security
Conferences
cyber threat
cybercriminal activities
DDoS
encrypted C&C channel
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »