Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mitigation
biblio
Detection and Mitigation of DDoS attack in Software Defined Networking: A Survey
Submitted by grigby1 on Thu, 06/22/2023 - 2:17pm
Industries
Switches
Software Defined Network
Resiliency
resilience
pubcrawl
network security
network function virtualization
mitigation
Metrics
dynamic networks
Human behavior
Floods
Dynamic scheduling
detection
denial-of-service attack
DDoS attack mitigation
DDoS
composability
security
biblio
Towards Inference of DDoS Mitigation Rules
Submitted by grigby1 on Thu, 06/22/2023 - 2:16pm
composability
Resiliency
denial-of-service attack
automation
attack
mitigation
DDoS attack mitigation
DDoS
Decision trees
machine learning
Computer crime
telecommunication traffic
Filtering
resilience
Metrics
Human behavior
pubcrawl
biblio
Systematic review on mitigating and preventing DDoS attacks on IoT networks
Submitted by grigby1 on Thu, 06/22/2023 - 2:09pm
Proposals
Prevention
DDoS Attack Prevention
Resiliency
mitigation
denial-of-service attack
MQTT
CoAP
Systematics
Compositionality
Internet of Things
DDoS Attacks
composability
Computer crime
Protocols
resilience
Metrics
pubcrawl
IoT
security
biblio
The Most Common Control Deficiencies in CMMC non-compliant DoD contractors
Submitted by grigby1 on Fri, 06/09/2023 - 1:13pm
US Department of Defense
Cybersecurity Damage Assessment
Security Control Deficiency
NIST SP 800–171
Control Family
CMMC
US Department of Homeland Security
Assessment
Resiliency
pubcrawl
mitigation
Regulation
Accreditation
Data Security
NIST
Computational modeling
resilience
biblio
Security and Privacy
Submitted by grigby1 on Fri, 04/28/2023 - 4:00pm
security controls
SDN/NFV
mMTC
cyber risk assessment and management
5G Cybersecurity
computer network reliability
policy governance
URLLC
Resiliency
computer theory
threat scenarios
cyber-attacks
Reliability
network function virtualization
defense
computer architecture
mitigation
Compositionality
Complexity theory
Data protection
composability
5G mobile communication
resilience
Metrics
Human behavior
pubcrawl
security
risk management
collaboration
privacy
biblio
Security Vulnerability and Mitigation in Photovoltaic Systems
Submitted by grigby1 on Fri, 11/18/2022 - 2:48pm
security
Intrusion Detection
pubcrawl
resilience
Resiliency
Software
performance evaluation
Scalability
Prototypes
security vulnerability
mitigation
Inverters
Photovoltaic systems
Security by Default
biblio
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
Submitted by grigby1 on Fri, 06/10/2022 - 1:47pm
security
pubcrawl
Analytical models
Scalability
Computational modeling
Artificial Intelligence
Forensics
investigation
explainable AI
mitigation
vulnerability detection
Man-machine systems
Human intelligence
human-in-the-loop
human in the loop
biblio
DDoS Mitigation: A Measurement-Based Approach
Submitted by grigby1 on Tue, 09/07/2021 - 3:21pm
threat mitigation
Resiliency
Metrics
Human behavior
attacks
composability
DDoS
DDoS attack mitigation
DDOS attacks detection
Denial-of-Service
internet measurement
mitigation
pubcrawl
resilience
biblio
Distributed DDoS Defense:A collaborative Approach at Internet Scale
Submitted by aekwall on Wed, 08/11/2021 - 2:51pm
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
attack intensities
DDoS
dissemination
future attacks
mitigation
Reaction
policy-based governance
Internet-scale Computing Security
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
1
2
3
next ›
last »