Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
UDP
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 11:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Developing Computer Applications without any OS or Kernel in a Multi-core Architecture
Submitted by grigby1 on Tue, 02/22/2022 - 1:42pm
Bare Machine Computing
computer architecture
pubcrawl
Metrics
UDP
Multicore processing
codes
operating system security
multicore
Web servers
Web server
multicore computing security
resilience
Resiliency
Scalability
process control
Prototypes
architecture
biblio
Detecting Malware Attack on Cloud using Deep Learning Vector Quantization
Submitted by grigby1 on Thu, 05/13/2021 - 12:21pm
performance evaluation
vector quantization
UDP
spoofing
Servers
Scalability
ResNet
Resiliency
resilience
pubcrawl
Attack vectors
Microprogramming
Memcached
injected code
Human behavior
Deep Learning Vector Quantizarion
deep learning
DDoS Attack
Computer crime
Cloud Computing
biblio
An Overview of Security in CoAP: Attack and Analysis
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
network servers
Constrained Application Protocol (CoAP)
Copper
cross-protocol attacks
datagram transport layer security
Datagram Transport Layer Security (DTLS)
denial of service
Denial of Service (DoS) attacks
DoS
DTLS
man-in-the-middle attack
CoAP security attack
peak security issues
proxy
Relay Attacks
replay attacks
request for comments 7252
RFC 7252
smart ecosystems
UDP
User Datagram Protocol (UDP)
Web transfer protocols
secure protocol
Internet of Things
security
Servers
pubcrawl
Human behavior
Metrics
resilience
IoT devices
telecommunication security
Protocols
computer architecture
composability
Browsers
Compositionality
Browser Security
authentication mechanism
Constrained Application Protocol
Internet of Things (IoT)
application layer protocol
channel security
client-server architecture
biblio
Removing the Bottleneck for Practical 2PC
Submitted by grigby1 on Mon, 08/26/2019 - 11:09am
composability
Cross Layer Security
efficiency
pubcrawl
resilience
Resiliency
TCP
transport layer
two party computation
UDP
biblio
A survey of distributed denial of service attack
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
Interconnected Systems
video surveillance
UDP
TCP
Servers
server
resources
Resiliency
pubcrawl
Protocols
Metrics
IP networks
botnets
information security
Human Factors
Human behavior
Floods
distributed denial of service attack
DDoS attack detection strategies
DDoS
computer network security
Computer crime
Cloud Computing
biblio
Using model checking for Trivial File Transfer Protocol validation
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
Protocols
validation
UDP
trivial file transfer protocol
transport protocols
TFTP protocol
TFTP
SPIN
Software verification
software engineering
exhaustive state space search
protocol design
formal verification
Internet user datagram protocol
model based checking tool
modeling
Promela
authentication
concurrency defect detection
file
Classification of UDP Traffic for DDoS Detection
Submitted by Katie Dey on Tue, 10/30/2012 - 4:30pm. Contributors:
Alexandru G. Bardas
Loai Zomlot
Sathya Chandran Sundaramurthy
Xinming Ou
S. Raj Rajagopalan
Marc R. Eisenbarth
ABSTRACT
1 Introduction
SaTC Posters
HP Labs
HP Tipping Point
Kansas State University
LOIC
Proportional-packet rate assumption
UDP
1018703
SaTC PI Meeting 2012
Academia
Industry
Poster