Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
denial-of-service attack
biblio
Security and privacy in IoT, Cloud and Augmented Reality
Submitted by grigby1 on Fri, 11/18/2022 - 2:48pm
real-time systems
AR
Security by Default
VR
denial-of-service attack
Technological innovation
cloud
Signal processing algorithms
DDoS
privacy
Scalability
Resiliency
resilience
pubcrawl
IoT
security
Cloud Computing
signal processing
biblio
Classification of Network Traffic Using Generative Adversarial Networks
Submitted by grigby1 on Wed, 11/02/2022 - 12:57pm
Training
machine learning
security
pubcrawl
Metrics
resilience
Resiliency
Scalability
telecommunication traffic
network traffic
network security
Cybersecurity
Complexity theory
generative adversarial networks
Generative Adversarial Learning
denial-of-service attack
biblio
Game-Theoretic Intrusion Prevention System Deployment for Mobile Edge Computing
Submitted by aekwall on Sun, 10/16/2022 - 6:04pm
simulation
IP networks
delays
Human Factors
Games
pubcrawl
Scalability
Predictive Metrics
denial-of-service attack
Pricing
Multi-access Edge Computing
game theoretic security
biblio
FLDDoS: DDoS Attack Detection Model based on Federated Learning
Submitted by grigby1 on Thu, 10/06/2022 - 3:20pm
resilience
Data Imbalance
Resiliency
DDoS Attack
Collaborative Work
denial-of-service attack
Named Data Network Security
Clustering algorithms
federated learning
deep learning
Computational modeling
data privacy
privacy
Scalability
Human Factors
Human behavior
pubcrawl
biblio
A Novel Approach for the Detection of DDoS Attacks in SDN using Information Theory Metric
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
tools
security
pubcrawl
Metrics
internet
Topology
intrusion detection system
Entropy
Measurement
software-defined network
Security Metrics
denial-of-service attack
Computing Theory
DDoS attack detection
information theory metrics
Mininet
biblio
Anomaly-based Intrusion Detection System Using Fuzzy Logic
Submitted by grigby1 on Fri, 09/16/2022 - 4:47pm
feature extraction
security
Intrusion Detection
pubcrawl
Metrics
resilience
Computer crime
information technology
Fuzzy logic
Open Source Software
denial-of-service attack
Feature Selection
Resiliency
distributed denial of service attack
intrusion detection system
biblio
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection
Submitted by grigby1 on Fri, 08/26/2022 - 11:23am
DDoS
smoke-screen
segmented flow
NetFlow
distributed denial-of-service
DDoS-as-a-smokescreen
DaaSS
concurrent flow
underlying attack
Personnel
denial-of-service attack
Concurrency
feature extraction
Metrics
composability
Intrusion Detection
internet
privacy
Conferences
Resiliency
resilience
pubcrawl
Anomaly Detection
security
biblio
The Design of the Hybrid Intrusion Detection System ABHIDS
Submitted by aekwall on Fri, 07/29/2022 - 4:26pm
denial-of-service attack
object oriented security
the hybrid algorithm
design
DDoS
Agent
filtering algorithms
Object oriented modeling
Attack detection
Information filters
Prototypes
composability
Resiliency
Metrics
pubcrawl
Databases
Intrusion Detection
biblio
Filtration method of DDoS attacks based on time-frequency analysis
Submitted by aekwall on Fri, 07/01/2022 - 9:46am
Chained Attacks
Conferences
DDoS Attacks
denial-of-service attack
Filtering
filtering algorithms
Filtering method
Fourier transform
pubcrawl
Resiliency
Resists
Scalability
Throughput
Time-frequency Analysis
wavelet transform
Wigner-Ville method
biblio
Self-organizing Software Defined Mesh Networks to Counter Failures and Attacks
Submitted by aekwall on Fri, 07/01/2022 - 9:45am
Mesh networks
Chained Attacks
Self-MIDAS
sFlow-RT
sFlow Collector
sFlow Agent
Policy Based Flow Management (PBFM)
flow tables
DDoS Attacks
Attack Detection and Mitigation
SDN
network architecture
automation
denial-of-service attack
telecommunication traffic
Manuals
Redundancy
Resiliency
Scalability
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »