Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
denial of service
biblio
Flooding attacks detection in MANETs
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
MANET
traffic generation
telecommunication traffic
statistical analysis
security threats
RREQ flooding attacks
Routing protocols
Routing
route discovery
pubcrawl170109
mobile ad hoc networks
Ad hoc networks
IP networks
flooding attack detection
DoS
denial of service
computer networks
computer network security
Computer crime
AODV
ah hoc on-demand distance vector
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
biblio
On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
network layer attacks
wireless sensor networks
wireless mesh routing protocol
wireless mesh networks
wireless mesh network
Wireless communication
security
Routing protocols
Routing Protocol
Routing
pubcrawl170109
Ambient Assisted Living
IoT-based ambient assisted living applications
Internet of Things
eHealthcare
DoS attacks
Denial of Service attacks
denial of service
data packet delivery ratio
computer network security
Computer crime
biblio
"Case study on exploitation, detection and prevention of user account DoS through Advanced Persistent Threats"
Submitted by abfox on Tue, 02/14/2017 - 12:08pm
Protocols
XMPP bots
XMPP based botnet
usingastealthy attack mechanism
user account lockout features
user account DoS
system engineers
sophisticated attack
Servers
security analysts
pubcrawl170101
advanced persistent threat
Monitoring
ISO standards
Irrigation
invasive software
Electronic mail
denial of service
Databases
computer network security
APT
advanced persistent threats
biblio
Design, implementation and security analysis of Hardware Trojan Threats in FPGA
Submitted by BrandonB on Thu, 04/30/2015 - 1:41pm
integrated circuits
RoT
security
denial of service
design
encryption
field programmable gate arrays
FPGA testbed
Hardware
hardware Trojan detection technique
hardware Trojan threats
Hardware Trojans
HDM
HTT detectability metric
HTT detection
ICs
timing variation
integrated logic circuits
invasive software
missed detection probability
normalized physical parameters
optimal detection threshold
power consumption
Power demand
Resiliency
root of trust
Security analysis
sensitive information leak
summation of false alarm
timing
Trojan taxonomy
Trojan horses
biblio
Bandwidth Distributed Denial of Service: Attacks and Defenses
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
denial of service
Servers
Routing protocols
network congestion
legitimate traffic
IP networks
internet
DoS mitigation
DoS attacks
DoS
Bandwidth
DDoS
computer security
computer network security
Computer crime
BW-DDoS defense
BW-DDoS attacks
brute force mechanisms
bandwidth flooding
bandwidth distributed denial-of-service
« first
‹ previous
1
2
3
4