Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crime
biblio
Method for Determining the Optimal Number of Clusters for ICS Information Processes Analysis During Cyberattacks Based on Hierarchical Clustering
Submitted by grigby1 on Fri, 08/18/2023 - 3:13pm
cyberattack
cyberattack classification
hierarchical clustering
Production management
Resiliency
ICS Anomaly Detection
Labeling
Measurement
Computer crime
Training
integrated circuits
industrial control system
industrial control
Scalability
resilience
pubcrawl
Anomaly Detection
biblio
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 3:40pm
resource management
Identity of Things (IDoT)
Identity Management (IdM)
IAM
digital certificates
device identity
Device Certificates
Block Chain
Fog computing
Internet of Things (IoT)
IoT security
Public key
Internet of Things
edge computing
Companies
Computer crime
PKI
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Implementation of Cyber Security for Enabling Data Protection Analysis and Data Protection using Robot Key Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 10:30am
Aerospace electronics
Human Factors
Metrics
resilience
Resiliency
Scalability
Access Control
Cryptography
Computer crime
Cloud Security
Human behavior
Homomorphic encryption
Data protection
RKHEA
SKA
Cloud Computing
information security
cyber security
pubcrawl
biblio
Obnoxious Deterrence
Submitted by grigby1 on Fri, 06/30/2023 - 1:33pm
critical infrastructure
pubcrawl
Human behavior
resilience
Resiliency
Scalability
cyberattack
Computer crime
standards
Cyberspace
ethics
Deterrence
Behavioral sciences
compellence
Cyberespionage
biblio
Using CyberScore for Network Traffic Monitoring
Submitted by grigby1 on Fri, 06/23/2023 - 11:27am
Monitoring
pubcrawl
resilience
Scalability
Industries
telecommunication traffic
Computer crime
deep packet inspection
statistical analysis
network intrusion detection
Resiliency
Inspection
open-source
Security Score
Traffic Measurement
biblio
A DDoS attack detection method based on deep learning two-level model CNN-LSTM in SDN network
Submitted by grigby1 on Thu, 06/22/2023 - 1:27pm
computer architecture
deep learning
feature extraction
pubcrawl
Human behavior
Metrics
resilience
telecommunication traffic
Computer crime
composability
Stability analysis
DDoS Attack
denial-of-service attack
DDoS attack detection
Resiliency
Attack detection model
biblio
Survey of DDoS Attack Detection Technology for Traceability
Submitted by grigby1 on Thu, 06/22/2023 - 1:27pm
machine learning
CNN
pubcrawl
Human behavior
Metrics
resilience
Computer crime
composability
network security
Economics
denial-of-service attack
DDoS Attack
DDoS attack detection
detection
Traceability
Resiliency
biblio
DDoS attack mitigation in cloud targets using scale-inside out assisted container separation
Submitted by grigby1 on Thu, 06/22/2023 - 1:16pm
pubcrawl
Human behavior
Metrics
resilience
Conferences
Computer crime
composability
Containers
DDoS attack mitigation
Time factors
denial-of-service attack
Resiliency
Distributed Denial of Service (DDoS)
security and protection
security in cloud computing
biblio
Towards Inference of DDoS Mitigation Rules
Submitted by grigby1 on Thu, 06/22/2023 - 1:16pm
composability
Resiliency
denial-of-service attack
automation
attack
mitigation
DDoS attack mitigation
DDoS
Decision trees
machine learning
Computer crime
telecommunication traffic
Filtering
resilience
Metrics
Human behavior
pubcrawl
biblio
Detection and Mitigation of Low and Slow DDoS attack in an SDN environment
Submitted by grigby1 on Thu, 06/22/2023 - 1:15pm
Protocols
Very large scale integration
software defined networking (SDN)
software defined networking
Slowloris
Servers
Resiliency
resilience
pubcrawl
DDoS attack detection
Metrics
Low and Slow Distributed Denial of Service (DDoS) attacks
Human behavior
Floods
denial-of-service attack
DDoS attack mitigation
Computer crime
composability
1
2
3
4
5
6
7
8
9
…
next ›
last »