Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Denial-of-Service
biblio
DDoS Mitigation: A Measurement-Based Approach
Submitted by grigby1 on Tue, 09/07/2021 - 2:21pm
threat mitigation
Resiliency
Metrics
Human behavior
attacks
composability
DDoS
DDoS attack mitigation
DDOS attacks detection
Denial-of-Service
internet measurement
mitigation
pubcrawl
resilience
biblio
Stealthy-Shutdown: Practical Remote Power Attacks in Multi - Tenant FPGAs
Submitted by aekwall on Thu, 05/13/2021 - 10:36am
Scalability
side-channel
power attack
multi-tenant
Denial-of-Service
attack surface
Threshold voltage
Power demand
Acceleration
field programmable gate arrays
sensors
tools
Metrics
pubcrawl
Resiliency
Task Analysis
FPGA
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 12:35pm
Synergetic Denial-of-Service
named data networking
network architecture
normal IFAs
pubcrawl
Resiliency
Resists
Scalability
SDoS attacks
security of data
IP networks
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
underwater acoustic communication
underwater sensor networks
UWSN
wireless sensor networks
denial-of-service attack
security
attacker identification
attackers synergize
computer network security
computer science
Data Transmission
delays
Denial-of-Service
Underwater Networks
denial-of-service attacks
DoS attacks
future network architectures
Human behavior
increased network traffic
Interest Flooding Attack
interest flooding attacks
internet
biblio
Challenges in ROS Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
robot hack acquistion
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
peer to peer application
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
Human behavior
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
availability attacks
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
biblio
N-1 RTU Cyber-Physical Security Assessment Using State Estimation
Submitted by aekwall on Mon, 07/06/2020 - 9:19am
state estimation
Damage Assessment
synthetic 200-bus system
power system devices
observability analysis
N-1 RTU cyber-physical security assessment
IEEE 14-bus system
EMS applications
electrical substations
Cyber-physical security assessment
cyber-physical impact
Remote Terminal Units
control center
state estimator
Denial-of-Service
security of data
substation automation
supervisory control and data acquisition system
private networks
SCADA system
power system control
power system state estimation
energy management systems
power system security
cyber-attacks
pubcrawl
Resiliency
cyber-physical systems
SCADA systems
cyber-attack
biblio
Securing GOOSE: The Return of One-Time Pads
Submitted by grigby1 on Fri, 05/08/2020 - 1:21pm
smart grid security
Protocols
pubcrawl
real-time communications
resilience
Resiliency
Secure GOOSE
securing GOOSE
security recommendations
power engineering computing
Smart Grids
smart power grids
substation automation
substation automation systems
substation security
Substations
Synthetic aperture sonar
telecommunication security
IEC 62351
Cryptographic Protocols
Denial-of-Service
devices attacks
encryption
generic object-oriented substation event
GOOSE messages
hardware requirements
IEC 61850
composability
IEC standards
international standard
latency constraints
latency requirements
Metrics
object oriented security
One-Time Pads
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 3:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 9:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
DeDoS: Defusing DoS with Dispersion Oriented Software
Submitted by grigby1 on Wed, 10/30/2019 - 9:31am
collaboration
comparability
Denial-of-Service
distributed systems
Human behavior
Metrics
pubcrawl
Resiliency
Scalability
Science of Security
biblio
A Mechanism for Mitigating DoS Attack in ICN-based Internet of Things
Submitted by grigby1 on Fri, 09/28/2018 - 3:14pm
security
resilience
pubcrawl
composability
Scalability
Metrics
edge detection
Resiliency
information centric networking
Interest Flooding Attack
Denial-of-Service
1
2
next ›
last »