Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mitigation
biblio
Mitigation of Cryptojacking Attacks Using Taint Analysis
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Resiliency
malware
man-in-the-middle
man-in-the-middle attack
Metrics
mitigation
online front-ends
pubcrawl
resilience
malicious cryptocurrency mining
script characteristics
security of data
taint analysis
taint analysis method
threat model
Web site background
Web sites
abuse case
in-browsercryptojacking mitigation
Human Factors
Human behavior
Google Chrome
Data mining
cryptomining
cryptojacking
Cryptography
cryptocurrency
cross-site scripting
CPU usage
CPU resources
Central Processing Unit
Browsers
Attack Modeling
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 12:57pm
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
Detection and Mitigation of DDoS Attacks Using Conditional Entropy in Software-defined Networking
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
DDoS attack mitigation
SDN security
network revolution
mitigation
lightweight approach
DDoS attack detection
control logic
conditional entropy
centralized management unit
centralized control
basic packet forwarding equipment
network resources
centralised control
DDoS detection
computer network security
distributed denial of service attacks
telecommunication control
SDN
software-defined networking
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
DDoS
biblio
A Formal Approach to Secure Speculation
Submitted by grigby1 on Fri, 04/03/2020 - 12:55pm
SMT
meltdown
microarchitectural side-channels
mitigation
observational-determinism
out-of-order-execution
safety-property
secure speculation property
secure speculative execution
side-channel
information-flow
software mitigations
Spectre
speculation
trace property-dependent observational determinism
trace-property
transient execution attacks
transient-execution
uclid5
resilience
formal verification
security
pubcrawl
Resiliency
verification
microarchitecture
Program processors
Transient analysis
Linux
Kernel
security of data
Metrics
Compositionality
provable security
formal
formal approach
Formal-Verification
hyperproperty
information flow security properties
biblio
A System Design of Real-Time Narrowband Rfi Detection And Mitigation for Gnss-R Receiver
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
resilience
mitigation
NF
Passband
pubcrawl
radio detection
radio receivers
radiofrequency interference
real-time narrowband radiofrequency interference detection
real-time narrowband radiofrequency interference mitigation
real-time NB RFI detection
real-time NB RFI mitigation
Receivers
Metrics
Resiliency
RFI
satellite navigation
signal-to-noise ratio
SNR
system analysis and design
system design
threat mitigation
white narrowband interference
Wireless communication
WNBI
FPGA
band-stop filters
cascading IIR band-stop filters
cGNSS-R
continuous wave interference
conventional GNSS-R
CWI
DDM
delay-Doppler map
detection
field programmable gate arrays
fixed-point implementation
Band-pass filters
Global navigation satellite system
Global Navigation Satellite Systems-reflectometry
GNSS-R
Human behavior
Human Factors
iGNSS-R
IIR BSF
IIR filters
IIR notch filter
interference suppression
interferometric GNSS-R receivers
biblio
An Efficient system to stumble on and Mitigate DDoS attack in cloud Environment
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
mitigation
mitigation method
killer software
facts generation
dynamic asset allocation
distributed denial of carrier
DDoS attack mitigation
cloud networks
DDoS Attack
resilience
microsoft windows
Computer crime
Metrics
composability
pubcrawl
Human behavior
network security
Support vector machines
Conferences
Servers
Cloud Computing
computer network security
biblio
Intrusion Detection and Mitigation System Using Blockchain Analysis for Bitcoin Exchange
Submitted by aekwall on Mon, 03/18/2019 - 9:51am
intrusion detection system
Scalability
Human behavior
pubcrawl
bitcoin
blockchain
Bitcoin exchange
blockchain analysis
mitigation
bitcoin security
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
Cyber security in smart grid convolution networks (SGCNs)
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
Monitoring
Smartgrid Convolution
Smart Grids
smart grid security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Cloud Computing
mitigation
Metrics
Meters
hackers
Fog Computing Security vulnerability
computer security
Cloud Service Delivering
« first
‹ previous
1
2
3
next ›
last »