Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security
biblio
Detection and Mitigation of DDoS attack in Software Defined Networking: A Survey
Submitted by grigby1 on Thu, 06/22/2023 - 2:17pm
Industries
Switches
Software Defined Network
Resiliency
resilience
pubcrawl
network security
network function virtualization
mitigation
Metrics
dynamic networks
Human behavior
Floods
Dynamic scheduling
detection
denial-of-service attack
DDoS attack mitigation
DDoS
composability
security
biblio
Detection and Mitigation of DDOS based Attacks using Machine Learning Algorithm
Submitted by grigby1 on Thu, 06/22/2023 - 2:16pm
machine learning
Servers
Resiliency
resilience
pubcrawl
Proposals
network security
Metrics
machine learning algorithms
DDoS attack detection
Human behavior
denial-of-service attack
Decision Making
DDoS Attacks
DDoS attack mitigation
composability
botnet
Analytical models
biblio
Automated DDoS Attack Mitigation for Software Defined Network
Submitted by grigby1 on Thu, 06/22/2023 - 2:16pm
Switches
k-nearest neighbor
ddos mitigation
Resiliency
Software Defined Network
DDoS Attack
denial-of-service attack
DDoS attack mitigation
network architecture
feature extraction
network security
control systems
real-time systems
composability
resilience
Metrics
Human behavior
pubcrawl
biblio
Analytical Survey on the Security Framework of Cyber-Physical Systems for Smart Power System Networks
Submitted by grigby1 on Fri, 06/09/2023 - 1:49pm
security
pubcrawl
resilience
Resiliency
Safety
Cloud Computing
Computational modeling
network security
Buildings
power system
power system stability
CPS
Stability analysis
Cyber-physical integrated security
biblio
Implementation of Privacy and Security in the Wireless Networks
Submitted by grigby1 on Fri, 06/02/2023 - 4:32pm
pubcrawl
dark web
Dynamic Network
Human behavior
Human Factors
network security
privacy
programming
security
Systems operation
wireless networks
wireless sensor networks
Writing
biblio
Lightweight Neural Network-based Web Fingerprinting Model
Submitted by grigby1 on Fri, 06/02/2023 - 4:31pm
pubcrawl
anonymous communication
Computational modeling
convolution
dark web
deep learning
Fingerprint recognition
Human behavior
Human Factors
network security
Neural networks
performance evaluation
Tor Network
biblio
Cross-Layered Cyber-Physical Power System State Estimation towards a Secure Grid Operation
Submitted by grigby1 on Tue, 05/30/2023 - 3:19pm
real-time systems
cross-layered
Cross layer design
software packages
denial-of-service attack
Synchronization
power systems
Compositionality
Smart Grids
network security
machine learning
composability
Communication networks
cyber security
Cross Layer Security
Resiliency
resilience
pubcrawl
cyber-physical systems
biblio
BA-CPABE : An auditable Ciphertext-Policy Attribute Based Encryption Based on Blockchain
Submitted by grigby1 on Fri, 05/19/2023 - 2:06pm
encryption
security
blockchain
pubcrawl
policy-based governance
collaboration
Scalability
privacy
data privacy
network security
Data Security
CP-ABE
blockchains
auditable
DID
biblio
A Comprehensive Analysis of NVD Concurrency Vulnerabilities
Submitted by grigby1 on Fri, 05/12/2023 - 10:26am
empirical study
software quality
security
Resiliency
resilience
programming
network security
Metrics
Market research
pubcrawl
Databases
CVE
Concurrent computing
Concurrency Vulnerability
Concurrency
composability
codes
biblio
Research on Location Information and Privacy Protection Based on Big Data
Submitted by grigby1 on Fri, 05/12/2023 - 10:20am
location information
The fuzzy theory
supply chains
Scalability
Resiliency
resilience
pubcrawl
privacy protection
privacy
network security
Forward Error Encryption
Information services
information networks
Human Factors
Human behavior
Heuristic algorithms
data privacy
Control Theory
Big Data
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »