Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
Synergetic Denial-of-Service
named data networking
network architecture
normal IFAs
pubcrawl
Resiliency
Resists
Scalability
SDoS attacks
security of data
IP networks
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
underwater acoustic communication
underwater sensor networks
UWSN
wireless sensor networks
denial-of-service attack
security
attacker identification
attackers synergize
computer network security
computer science
Data Transmission
delays
Denial-of-Service
Underwater Networks
denial-of-service attacks
DoS attacks
future network architectures
Human behavior
increased network traffic
Interest Flooding Attack
interest flooding attacks
internet
biblio
Hybrid Network Mobility Support in Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:34pm
Internet architecture
TCP/IP address
signalling protocols
signaling protocols
producer mobility
network mobility
Multi-layer neural network
location addresses
Internet connection
hybrid network mobility support
efficient network mobility support scheme
consumer mobility
data retrieval
mobile nodes
IP networks
information-centric networking
Face
NDN
named data networking
internet
Routing
Routing protocols
pubcrawl
Human behavior
Resiliency
transport protocols
Scalability
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
Protocols
SDN technology
real-time entropy features
Partial flow
packet count entropies
openflowbased switch capabilities
OpenFlow
DDoS attack detection capabilities
categorized partial-flows
software-defined networking
DDoS attack detection
computer networks
Switches
software defined networking
SDN
Internet of Things
real-time systems
composability
Entropy
Computer crime
internet
IoT devices
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
feature extraction
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:58pm
slow HTTP attack
Metrics
network flow data
network management complexity
Ping flood attack
pubcrawl
resilience
Resiliency
Servers
IP networks
software defined networking
Software Defined Networks
TCP flags
TCP SYN flood attack
telecommunication control
telecommunication traffic
transport protocols
distributed denial of service attack
botnet
composability
Computer crime
computer network management
computer network security
DDoS attack detection
denial-of-service attack
distributed denial of service
DDoS attack mitigation
distributed source
Entropy
Floods
HTTP attacks
Human behavior
internet
invasive software
biblio
3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
decentralize identity management system
TTP
trusted third party
three blockchains identity management
telecommunication security
self-generated identity
self-generated certificates
Scalability
Resiliency
public key cryptography
pubcrawl
Metrics
internet
elliptic curves cryptography
Elliptic curve cryptography
Identity management
Cybersecurity
Cryptographic Protocols
computer network security
computer network management
certificate authority
Blockchains Identity Management
blockchain technology
blockchain
autonomous network
authorisation
authentication server
Authentication Protocols
3BI-ECC
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
biblio
XSS Detection Technology Based on LSTM-Attention
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
LSTM-attention detection model
XSS attacks
abstract features
added attention mechanism
attention mechanism
context-related features
Cross-site scripting (XSS)
inadequate feature extraction
long short-term memory recurrent neural network
cross-site scripting
malicious attack codes
traditional XSS detection methods
Word2Vec
XSS codes
XSS detection model
XSS detection technology
XSS payload features
Cross Site Scripting
Scalability
learning (artificial intelligence)
security of data
feature extraction
pubcrawl
Human behavior
resilience
Resiliency
robots
deep learning
Data models
internet
recurrent neural nets
pattern classification
Recurrent neural networks
Context modeling
LSTM
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 1:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 1:12pm
hidden cryptocurrency mining activities
security
Resiliency
resilience
pubcrawl
online front-ends
MiNo
Metrics
malware
malicious mining activities
invasive software
internet
Human behavior
Web Browser Security
Hidden Cryptocurrency Mining
digital currencies
Data mining
cryptojacking
cryptocurrency mining
cryptocurrencies
computer resources
Coinhive
Coin Mining
Chrome Web browser add-on application
cash money
bitcoin
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »