Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Detectors
Spark
signature-based approach
signature
Resiliency
pubcrawl
neural nets
Neural
Metrics
Intrusion Detection
Human behavior
feature extraction
distributed denial of service attacks
digital signatures
Amazon public cloud
DDoS attack detection
DDoS
computer network security
Computer hacking
Computer crime
composability
Cloud Computing
cloud
Artificial Neural Networks
artificial intelligence security
Artificial Intelligence
anomaly-based distributed artificial neural networks
Anomaly
biblio
Resolving Threats in IoT: ID Spoofing to DDoS
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
IP networks
Zigbee
unique identity
security of data
resource-constrained network
Resiliency
pubcrawl
PseudoRandom Identity Generator
Protocols
PRIG-adapted 6LoWPAN
personal area networks
personal area network model
Peer-to-peer computing
malware
malicious machines spoof ID
IP-enabled devices
6LoWPAN
IoT
invasive software
Internet-of-Things
Internet of Things
ID validation time
ID spoofing vulnerabilities
ID Spoofing
DDoS stress
DDoS
computer network security
Computer crime
composability
botnet
administrative machines
biblio
Fog Computing as a Defensive Approach Against Distributed Denial of Service (DDoS): A Proposed Architecture
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
captchas
Cloud Computing
computer architecture
Computer crime
DDoS
edge computing
Fog computing
Fog defense
Fog defense architecture
IP networks
IP spoofing
biblio
DDoS attack defense framework for cloud using fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
Cloud Computing
Computer crime
computer network security
DDoS
DDoS attack defense framework
DDoS attack traffic
Decision Making
edge computing
Fog computing
fog defender
IP networks
Market research
Servers
telecommunication traffic
tools
biblio
Flooding attack detection and prevention in MANET based on cross layer link quality assessment
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
link layer assessment based flooding attack detection
Topology
telecommunication security
telecommunication network routing
routing table
Routing
Resiliency
resilience
pubcrawl
network topology
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
accurate flooding attack detection
flooding node detection
Flooding Attack
Distributed Denial of Services attack
DDoS Attack
DDoS
cross layer MAC-Network interface
cross layer link quality assessment
Cross layer design
Cross Layer
Computer crime
Compositionality
Attack detection
biblio
Cloud-Side Shuffling Defenses Against DDoS Attacks on Proxied Multiserver Systems
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
security
pubcrawl
Resiliency
DDoS
composability
Cloud Computing
resilience
Metrics
Networked Control Systems Security
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
An API Honeypot for DDoS and XSS Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
DDoS
XSS
testing
Servers
Resiliency
resilience
REpresentational State Transfer Application Programming Interface
pubcrawl
malware
invasive software
distributed denial of service attack
API honeypot
cross-site scripting malware insertion
cross-site scripting
Concurrent computing
computer network security
Computer crime
Compositionality
attack profiles
application program interfaces
APIs
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »