Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Designing a Micro-moving Target IPv6 Defense for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
Metrics
testing
sensors
Resiliency
Reconnaissance
pubcrawl
Protocols
optimization
moving target defense
micromoving target IPv6 defense
Cooja simulation configuration
Limiting
IP networks
IoT devices
IoT
Internet of Things
internet
hardware testing
embedded systems
cyber security
biblio
Development of a mathematical model of the control beginning of DDoS-attacks and malicious traffic
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
internet
Training
telecommunication traffic
subsequent blocking
started attack
Servers
Resiliency
pubcrawl
Network Monitoring
mixed traffic
Metrics
Mathematical model
Malicious Traffic
Algorithm design and analysis
Human behavior
DDoS-attacks
DDoS-attack
DDoS attack detection
Data protection
Cybersecurity
control beginning
computer network security
Computer crime
composability
Clustering algorithms
Classification algorithms
biblio
Review on Detection Techniques against DDoS Attacks on a Software-Defined Networking Controller
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
information and communication technologies
telecontrol
software-defined networking controller
software defined networking
SDN security
SDN controller
SDN
Resiliency
remotely controlled networks
pubcrawl
Protocols
Metrics
IP networks
internet
centralised control
Human behavior
Entropy
detection techniques
DDoS detection
DDoS Attacks
DDoS attack detection
control systems
computer network security
Computer crime
composability
Communication Systems
centralized controller
biblio
User Behavior Anomaly Detection for Application Layer DDoS Attacks
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
legitimate application layer requests
web services
Web servers
user behavior anomaly detection method
subspace anomaly detection method
student resource portal
Resiliency
pubcrawl
Protocols
protocol characteristics
principle component analysis
principal component analysis
Penetration Testing
PCA-subspace
PCA
Metrics
anomalous behavior instance detection
internet
Human behavior
HTTP Web server logs
HTTP DDoS attacks
file servers
feature extraction
distributed denial of service attacks
DDoS attack detection
Cyber Attacks
computer network security
Computer crime
composability
Browsers
application layer DDoS attacks
Anomaly Detection
biblio
Fingerprinting non-numeric datasets using row association and pattern generation
Submitted by grigby1 on Tue, 01/16/2018 - 5:22pm
Pattern generation and row association schemes
internet
Metrics
Non-numeric datasets
nonnumeric digital data
original pattern
Outsourced Database Integrity
Ownership protection
ownership rights
pattern generation
Fingers
primary key
pubcrawl
relational data
relational databases
Resiliency
row association schemes
RSA encryption
Secret key
Watermarking
fake rows
business purposes
composability
Cryptography
data analysis
Decoding
digital rights protection
encryption
fake attributes
fake pattern
application environment
fast internet
Fibonacci series
fingerprint detection algorithm
fingerprint identification
Fingerprint recognition
fingerprint sequence
Fingerprinting
fingerprinting nonnumeric datasets
biblio
Detecting phishing attacks from URL by using NLP techniques
Submitted by K_Hooper on Wed, 01/10/2018 - 10:15am
natural language processing
URL
unsolicited e-mail
Uniform resource locators
security of data
Scalability
Resiliency
random forest algorithm
pubcrawl
Postal services
phishing attack analysis report
phishing attack
NLP
natural language processing techniques
Computer crime
Nanoelectromechanical systems
Markov processes
machine learning-based system
machine learning
learning (artificial intelligence)
Law
Internet users
internet
Human behavior
cyber security
cyber attack threats
Cyber Attack Detection
biblio
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Human behavior
telecommunication channels
set-theoretic control framework
set theory
Science of Security
Scalability
resilient control
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
internet
Human Factors
actuators
FDI attacks
encryption algorithms
Detectors
cyber-physical systems
cyber false data injection attacks
Cryptography
control remediation strategy
composability
Communication channels
collaboration
anomaly detector module
biblio
Advances and challenges of quantitative verification and synthesis for cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Monitoring
Wearable devices
software reliability
Software
self-driving cars
Science of Security
Scalability
safety-critical software
safety critical contexts
robotic assistants
Resiliency
Quantitative Verification
pubcrawl
Probabilistic logic
Policy-Governed Secure Collaboration
Adaptation models
Metrics
Markov processes
internet
implantable devices
Human Factors
Human behavior
formal verification
factory automation systems
cyber-physical systems
composability
collaboration
business-critical contexts
Biomedical monitoring
biblio
Evaluating micro patterns and software metrics in vulnerability prediction
Submitted by grigby1 on Thu, 12/28/2017 - 12:30pm
source code
pubcrawl
security
security of data
security vulnerabilities
Software
software metrics
software quality
software security
program testing
source code (software)
stand-alone Java web applications
time effective software testing
traditional class-level software metrics
traditional software metrics
vulnerability prediction model
vulnerable classes
vulnerable code
Java
Apache Tomcat
class-level patterns
class-level traceable patterns
Complexity theory
cost effective software testing
Design patterns
early detection
internet
Apache Camel
learning (artificial intelligence)
machine learning techniques
Metrics
micropatterns evaluation
Object oriented modeling
Predictive Metrics
Predictive models
predictive security metrics
biblio
Scalability of Cloud Based SCIT-MTD
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
moving target defense
Web application
Virtual machining
share-nothing architecture pattern
Servers
self cleansing intrusion tolerance
security of data
security
SCIT
Scalability
Resiliency
quality attributes
pubcrawl
multiple instance system
multinode system
attack surface
malicious intrusions
load demand modeling
intrusion tolerance
internet
Data protection
cybersecurity protection
continuous rotation
computer architecture
composability
cloud infrastructure services
Cloud Computing
cloud based SCIT-MTD scalability
cloud
« first
‹ previous
…
71
72
73
74
75
76
77
78
79
…
next ›
last »