Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireshark
biblio
DDoS Attack using SYN Flooding: A Case Study
Submitted by grigby1 on Thu, 06/22/2023 - 1:17pm
DDoS attack mitigation
SYN Flooding Attack
mitigation techniques
Covid
metasploit
Distributed Denial of Service (DDoS)
Resiliency
denial-of-service attack
Cyberspace
Wireshark
botnet
security
malware
Floods
composability
telecommunication traffic
internet
resilience
Metrics
Human behavior
pubcrawl
biblio
Cyber Security Actionable Education during COVID19 Third Wave in India
Submitted by grigby1 on Fri, 03/03/2023 - 8:23am
resilience
DNS spoofing
passwords
Linux Operating System Security
COVID-19
ARP Spoofing
network intrusion detection
MITM
Wireshark
education
cyber security
Compositionality
domain name system
Linux
composability
Protocols
Resiliency
Metrics
pubcrawl
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
biblio
Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures
Submitted by grigby1 on Wed, 02/26/2020 - 3:40pm
Meterpreter
Wireshark
Vectors
Traceroute
tools
threat vectors
testing
skilled cybercriminal
Reconnaissance
pubcrawl
privacy
primary security concerns
Organizations
Metrics
advance persistant threat
Measurement
malware
Kali Linux
HPING3 Metasploit-Framework
Foot-printing
cyber spying
Computer crime
Clearing Tracks
big picture
big organizations
Attack vectors
advanced persistent threat
Advance Persistent Threat
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist