Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS
biblio
DDoS Mitigation: A Measurement-Based Approach
Submitted by grigby1 on Tue, 09/07/2021 - 3:21pm
threat mitigation
Resiliency
Metrics
Human behavior
attacks
composability
DDoS
DDoS attack mitigation
DDOS attacks detection
Denial-of-Service
internet measurement
mitigation
pubcrawl
resilience
biblio
Distributed DDoS Defense:A collaborative Approach at Internet Scale
Submitted by aekwall on Wed, 08/11/2021 - 2:51pm
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
attack intensities
DDoS
dissemination
future attacks
mitigation
Reaction
policy-based governance
Internet-scale Computing Security
biblio
Exact and approximation algorithms for sensor placement against DDoS attacks
Submitted by aekwall on Tue, 04/27/2021 - 1:35pm
DDoS
Scalability
Resiliency
pubcrawl
sensor placement
Security Heuristics
predictability
Heuristics
minimum multicut
network safety optimization
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
potential botnet existence
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
IoT
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
connected devices
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
AI-powered honeypots
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 1:00pm
Switches
φ-entropy
SDN networks
network cyber security
forwarding logic
DDoS traffic formation
control logic
DDoS attack detection method
distributed denial of service attack
DDoS attack detection
denial-of-service attack
information entropy
network architecture
DDoS
microsoft windows
IP networks
Attack detection
software defined networking
SDN
telecommunication traffic
composability
Entropy
Computer crime
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
DDOS attacks detection
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
Global Positioning System
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
computer network security
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
learning (artificial intelligence)
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
biblio
Distributed Denial of Service Defense in Software Defined Network Using OpenFlow
Submitted by grigby1 on Tue, 02/16/2021 - 12:45pm
dynamic threshold
distributed denial of service attacks
denial-of-service attack
control plane
OpenFlow
application plane
centralized control
data plane
Distributed Denial of Service defense
network security threats
exponentially weighted moving average algorithm
moving average processes
network architecture solution
OpenFlow protocol
Renyi entropy
Software Defined Network
traditional network system
dynamic networks
Entropy
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
Computer crime
security
composability
telecommunication traffic
DDoS Attacks
Protocols
SDN
software defined networking
DDoS
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »