Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
DDoS Attack Mitigation through Root-DNS Server: A Case Study
Submitted by grigby1 on Fri, 04/03/2020 - 11:19am
Predictive models
true positive rate metric
traffic routing algorithms
telecommunication traffic
Support vector machines
Servers
Routing protocols
root-DNS server
root dns
RIPE Atlas
resource allocation
Random Forest
quality of service
pubcrawl
Probes
predictive security metrics
anycast
Metrics
machine learning
logistic regression
Load management
load balancing
k-nearest neighbors
IP networks
IP anycast
high availability
domain name system
DDoS attack mitigation
DDoS
cyber security
computer network security
Computer crime
biblio
Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT
Submitted by aekwall on Mon, 03/30/2020 - 10:39am
QR codes
SSL
security concerns
secured web service
Response code
QR code based approach
lightweight security algorithm
hard-coded credentials related attacks
Hard-coded credentials
GUI
clear text log-in id
password
IoT manufacturers
computer network security
QR code
cyber physical systems
web services
pubcrawl
Resiliency
invasive software
IoT devices
Internet of Things
Cryptography
authorisation
DDoS
biblio
A Robust TCP-SYN Flood Mitigation Scheme Using Machine Learning Based on SDN
Submitted by grigby1 on Wed, 02/26/2020 - 3:44pm
security
pubcrawl
resilience
Resiliency
resource overload
robust TCP-SYN flood mitigation scheme
SDN
SDN controller
SDN networks
networking technology
security device
Software Define Networking
software defined networking
system stop
TCP-SYN flood attack mitigation
TCP-SYN Flood Mitigation
threat mitigation
centralized management
network operators
mitigation methods
Metrics
machine learning
learning (artificial intelligence)
KNN
Internet users
internet
Human Factors
Human behavior
flexible processing
DDoS
computer network security
computer network management
complex security algorithms
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
network topology
WEKA
threat vectors
Support vector machines
support vector machine
software defined networking
security threat protection
SDN network
SDN
random forests
Random Forest
pubcrawl
privacy
Computer crime
nearest neighbour methods
Metrics
Measurement
machine learning
k-nearest neighbors
J48
Floods
distributed denial-of-service attack
DDoS attack detection
DDoS
control systems
computer network security
biblio
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
Training
TCP congestion-control mechanism
support vector machine based machine learning model
PSD based entropy
PSD
power spectral density
malicious LDoS traffic
Low-rate DDoS
LDoS attacks
Entropy.
decision algorithm
complex low-rate DoS attack detection
communication complexity
Predictive Metrics
decision theory
Entropy
Computer crime
SVM
detection algorithms
machine learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
distributed denial of service attack
telecommunication traffic
intrusion detection system
DDoS
computer network security
biblio
DDoS Botnet Prevention Using Blockchain in Software Defined Internet of Things
Submitted by grigby1 on Wed, 12/18/2019 - 1:47pm
distributed blockchain
telecommunication security
software defined networking
software defined Internet of Things
SDN
Resiliency
resilience
pubcrawl
Metrics
invasive software
Internet of Things
Human behavior
Force
distributed denial of service attacks
botnets
defense perspectives
DDoS botnet prevention
DDoS Attack Prevention
DDoS
control center
computer network security
Computer crime
composability
botnet prevention system
botnet bondage
botnet
blockchain
bitcoin
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Detection and Prevention of DoS Attacks on Network Systems
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
network systems
internet
Internet development
IoT
IoT contraptions
malevolent undertaking
masterminded resources
Metrics
mishandled machines
incorporating establishment
Organizations
PC structures
pubcrawl
resilience
Resiliency
Servers
standard action
strike action
DDoS Attack
botnet
Cloud Computing
composability
Computer crime
computer network security
convergence
DDoS
DDoS ambushes
anomalous express
DDoS Attack Prevention
denial
distributed denial of service strike
DoS attacks
flood
Floods
Human behavior
biblio
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
internet
traffic classifier
telecommunication traffic
Servers
Resiliency
resilience
pulse wave type DDoS-attack prevention
pubcrawl
network technologies
Network
Metrics
IP networks
botnet
Human behavior
firewalls
firewall
dpi
DDoS Attack Prevention
DDoS attack detection
DDoS
Computer crime
composability
Communication networks
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »