Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
denial of service
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
Adaptive Resource Management Enabling Deception (ARMED)
Submitted by grigby1 on Mon, 11/19/2018 - 12:27pm
Cybersecurity
deception
denial of service
Human behavior
Human Factors
pubcrawl
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
A secure reputation based architecture for MANET routing
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Routing
Node identity
Prime Product Number
pubcrawl
Reliability
reputation level table
Reputation Value
resilience
Resiliency
Monitoring
Routing misbehavior
Routing protocols
secure reputation based architecture
secure routing protocol
specific prime number
telecommunication security
Wireless ad hoc network
Worm hole attacks
legitimacy value table
backbone network
civilian domains
Compositionality
Cryptography
denial of service
Denial of Service attacks
DoS attacks
grid structure
attack mitigation
malicious node effect mitigation
MANET
MANET routing
Metrics
military domains
mobile ad hoc network
mobile ad hoc networks
biblio
Protecting SDN controller with per-flow buffering inside OpenFlow switches
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
software defined networking
per-flow buffering
process control
Protocols
pubcrawl
Resiliency
routers
Scalability
SDN controller
SDN security
Servers
packet-in flood
standards-compliant protocol
statistical analysis
switch flow tables
switch memory
table-miss
telecommunication control
telecommunication network routing
telecommunication switching
telecommunication traffic
working principles
DPDK
centralized controller
computer network security
control channel
control logic
control plane
control systems
data plane
denial of service
denial-of-service attacks
DoS attacks
buffer\_id feature
Floods
heavy control traffic conditions
individually buffered packets
IP networks
Monitoring
Open vSwitch
OpenFlow
OpenFlow protocol
OpenFlow switches
OpenFlow traffic
biblio
Lightweight Address Hopping for Defending the IPv6 IoT
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
address hopping
collaboration
composability
denial of service
Internet of Things
IoT
IPv6
ipv6 security
Metrics
network security
pubcrawl
reconnaisance
Resiliency
security
biblio
Blocking intrusions at border using software defined-internet exchange point (SD-IXP)
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
denial of service
IP networks
Metrics
moving target defense
network security
pubcrawl
Reconnaissance
Resiliency
Software
software defined networking
Software Defined Networks
Switches
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree
biblio
Call Me Back!: Attacks on System Server and System Apps in Android Through Synchronous Callback
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
composability
denial of service
Metrics
Mobile Security
pubcrawl
synchronous callback
taint analysis
vulnerability detection
« first
‹ previous
1
2
3
4
next ›
last »