Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Preventing IoT DDoS Attacks using Blockchain and IP Address Obfuscation
Submitted by grigby1 on Wed, 04/13/2022 - 2:53pm
composability
DDoS Attack Prevention
IP address obfuscation
distributed denial of service
blockchains
identity authentication
denial-of-service attack
Internet of Things
Signal processing algorithms
Metrics
signal processing
Wireless communication
authentication
Resiliency
resilience
Human behavior
pubcrawl
blockchain
Computer hacking
biblio
DDOS prevention in IoT
Submitted by grigby1 on Wed, 04/13/2022 - 2:52pm
malware
DDoS Attack Prevention
DDoS prevention
mirai
denial-of-service attack
Technological innovation
data communication
IoT security
Metrics
Internet of Things
composability
Industries
batteries
network security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Light-Weight DDoS Mitigation at Network Edge with Limited Resources
Submitted by grigby1 on Wed, 04/13/2022 - 10:28am
Internet of Things
resource management
Resiliency
resilience
Queueing analysis
pubcrawl
performance evaluation
Metrics
Logic gates
Communication system security
Image edge detection
Human behavior
Floods
denial-of-service attack
DDoS attack mitigation
computer network management
Computer crime
composability
biblio
Queue Allocation-Based DDoS Mitigation at Edge Switch
Submitted by grigby1 on Wed, 04/13/2022 - 10:28am
Internet of Things
Switches
Resiliency
resilience
Queueing analysis
pubcrawl
Metrics
Market research
machine learning algorithms
Communication system security
Image edge detection
Human behavior
denial-of-service attack
DDoS attack mitigation
Conferences
Computer simulation
computer network management
composability
biblio
Challenges of DDoS Attack Mitigation in IoT Devices by Software Defined Networking (SDN)
Submitted by grigby1 on Wed, 04/13/2022 - 10:27am
Metrics
software defined networking
security
SDN architecture
Resiliency
resilience
pubcrawl
performance evaluation
network architecture
composability
IoT devices
Internet of Things
Human behavior
denial-of-service attack
DDoS attacks mitigation
DDoS Attacks
DDoS attack mitigation
computer architecture
biblio
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT
Submitted by aekwall on Wed, 04/13/2022 - 10:15am
security
Intrusion Detection
Internet of Things
performance evaluation
machine learning
Conferences
pubcrawl
Resiliency
telecommunication traffic
Distance measurement
intrusion detection system
network profiling
Productivity
Damage Assessment
biblio
Extracting Threat Intelligence Related IoT Botnet From Latest Dark Web Data Collection
Submitted by grigby1 on Tue, 04/12/2022 - 12:13pm
Data collection
cyber security
pubcrawl
Human behavior
Databases
malware
Market research
Internet of Things
botnet
threat intelligence
Crawlers
dark web
social computing
biblio
IoT Metrics and Automation for Security Evaluation
Submitted by grigby1 on Fri, 04/01/2022 - 2:48pm
Internet of Things
security
IoT
pubcrawl
standards
Metrics
research and development
automation
Security Metrics
Time measurement
Time to market
biblio
Introducing Mobility Metrics in Trust-based Security of Routing Protocol for Internet of Things
Submitted by grigby1 on Fri, 04/01/2022 - 2:47pm
Security by Default
Internet of Things
Linear programming
Measurement
Metrics
mobile nodes
Mobility
pubcrawl
Routing
Routing protocols
RPL
security
Security Metrics
smart cities
Smart homes
trust
biblio
Security Considerations in the Internet of Things Protocol Stack
Submitted by aekwall on Fri, 04/01/2022 - 2:06pm
security
Software
Internet of Things
Internet of Things (IoT)
Protocols
real-time systems
Wireless communication
pubcrawl
Resiliency
Compositionality
Transportation
Predictive Metrics
IoT Protocol Stack
Vulnerability
wireless
Scientific Computing Security
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »