Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crime
biblio
User behaviour modelling based DDoS attack detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
expectation maximization
user modelling
user modeling
user behaviour modelling
telecommunication traffic
signal processing
network system
Mathematical model
IP networks
Human Factors
Adaptation models
EM
distributed denial of service
destination IP traffic
DDoS attack detection
DDoS
Conferences
computer network security
Computer crime
Anomaly Detection
biblio
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
IP networks
traffic control component
traffic control
traceback-based defense
trace back component
telecommunication traffic
TDFA
spoofed IP addresses
quality of service
Protocols
packet forwarding rate
packet filtering
network security problems
IP Traceback
attack packets
internet
Image edge detection
Filtering
distributed denial of service attack
Deterministic Flow Marking
detection component
DDoS flooding attacks
DDoS Attack
computer network security
Computer crime
Bandwidth
attacking traffic
biblio
Robust H #x221E; cyber-attacks estimation for control systems
Submitted by BrandonB on Thu, 04/30/2015 - 11:59am
Markovian stochastic process
Symmetric matrices
stochastic systems
Stochastic processes
stochastic data DoS attack
stochastic data deception attack
stochastic cyber-attacks
Robustness
robust H∞ cyber-attacks estimation
robust control
quadruple-tank process
QTP
actuators
Markov processes
LMI
linear matrix inequalities
H∞ filters
H∞ filter
H∞ control
estimation
Cyber Attacks
control systems
control system synthesis
Computer crime
biblio
Finite energy and bounded attacks on control system sensor signals
Submitted by BrandonB on Thu, 04/30/2015 - 11:54am
linear quadratic control
Eigenvalues and eigenfunctions
Emerging control theory
enterprise level networks
error signals
Fault-tolerant systems
finite energy
Generators
hardware failures
information security techniques
distributed LQ controllers
linear quadratic Gaussian control
networks security
observer-based controlled systems
power generation network
sensor signal attacks
sensors
software failures
threat surface
Vectors
control system protection
attack free systems
bounded attacks
closed loop systems
closed-loop systems
Computer crime
computer network reliability
computer network security
Control applications
control system networks
actuator signal attacks
control system reliability
control system sensor signals
Cost function
cost functions maximization
CPS protecting
critical industrial controls systems
cyber-attacks
cyber-physical systems protection
biblio
The Psychology of Security for the Home Computer User
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
Phishing
usability and security
Software
security interventions
security decisions
security breaches
security
risky behavior
privacy
Computational modeling
home users
home computer user
Electronic mail
Educational institutions
Computers
computer security
Computer crime
biblio
Attacks and Defenses in the Data Plane of Networks
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:33pm
NetFPGA
software-programmable network processors
software vulnerabilities
security issues
Routing protocols
programmable router
Program processors
processing monitor
packet processing software
packet forwarding
network security
network routers
network processor
network attack
Computer crime
logic devices
internet
hardware-based defense mechanism
field programmable gate arrays
embedded systems
embedded system security
denial-of-service attack
data plane
custom-logic hardware
control plane
computer networks
computer network security
« first
‹ previous
…
52
53
54
55
56
57
58
59
60