Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
Histograms
uncertainty
telecommunication traffic
service attacks
security
Resiliency
resilience
pubcrawl
nonattack traffic
Metrics
IP networks
IP
Intrusion Detection
Internet technologies
internet
Anomaly Detection
graphics-based features
graph based features
fuzzy relevance function
Fuzzy logic
fuzzy clustering
Entropy
detection stage
DDoS intrusion detection approach
DDoS detection algorithm
DDoS detection
Cyber Physical System
computer network security
Computer crime
attack traffic
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 1:37pm
human computer interaction
visualization
visual symbols
user personal information security
user authentication
usability
smartphone
smart phones
pubcrawl
password
mobile device
mobile computing
message authentication
alphanumeric symbols
Human behavior
graphical user interfaces
Graphical Password
Entropy
composability
click symbols alphabet
captchas
Captcha-based password
Captcha security
captcha based graphical password
authorisation
authentication
biblio
Reliability Analysis of Concurrent Data based on Botnet Modeling
Submitted by grigby1 on Tue, 03/09/2021 - 1:23pm
network modelling
unsolicited e-mail
time series
telecommunication traffic
spam
security risks
security of data
Resiliency
resilience
reliability analysis
Reliability
pubcrawl
pattern clustering
network traffic time series
botnet modeling
multidimensional permutation entropy
Metrics
invasive software
high-privilege systems
Entropy
detection methods
data complex structure analysis
concurrent data
computer network security
composability
clustering variance method
botnets
biblio
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique
Submitted by grigby1 on Tue, 02/23/2021 - 1:57pm
network intrusion detection system
Training data
Training
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
principal component analysis
networking technologies
Network reconnaissance
network packets
anomaly based IDS
network attack
machine learning
intrusion detection system
Intrusion Detection
IDS systems
Hidden Markov models
feature extraction
entropy based discretization technique
Entropy
discretization
computer network security
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:00pm
Switches
φ-entropy
SDN networks
network cyber security
forwarding logic
DDoS traffic formation
control logic
DDoS attack detection method
distributed denial of service attack
DDoS attack detection
denial-of-service attack
information entropy
network architecture
DDoS
microsoft windows
IP networks
Attack detection
software defined networking
SDN
telecommunication traffic
composability
Entropy
Computer crime
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
Protocols
SDN technology
real-time entropy features
Partial flow
packet count entropies
openflowbased switch capabilities
OpenFlow
DDoS attack detection capabilities
categorized partial-flows
software-defined networking
DDoS attack detection
computer networks
Switches
software defined networking
SDN
Internet of Things
real-time systems
composability
Entropy
Computer crime
internet
IoT devices
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IP networks
feature extraction
biblio
A DDoS Attack Detection Method Based on Information Entropy and Deep Learning in SDN
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDoS Attacks
information entropy detection
fine-grained packet-based detection
DDoS attack traffic
DDoS attack detection method
convolutional neural network model
Software Defined Network
data plane
DDoS attack detection
control plane
information entropy
software defined networking
SDN
learning (artificial intelligence)
telecommunication traffic
composability
Entropy
deep learning
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
slow HTTP attack
Metrics
network flow data
network management complexity
Ping flood attack
pubcrawl
resilience
Resiliency
Servers
IP networks
software defined networking
Software Defined Networks
TCP flags
TCP SYN flood attack
telecommunication control
telecommunication traffic
transport protocols
distributed denial of service attack
botnet
composability
Computer crime
computer network management
computer network security
DDoS attack detection
denial-of-service attack
distributed denial of service
DDoS attack mitigation
distributed source
Entropy
Floods
HTTP attacks
Human behavior
internet
invasive software
biblio
Distributed Denial of Service Defense in Software Defined Network Using OpenFlow
Submitted by grigby1 on Tue, 02/16/2021 - 11:45am
dynamic threshold
distributed denial of service attacks
denial-of-service attack
control plane
OpenFlow
application plane
centralized control
data plane
Distributed Denial of Service defense
network security threats
exponentially weighted moving average algorithm
moving average processes
network architecture solution
OpenFlow protocol
Renyi entropy
Software Defined Network
traditional network system
dynamic networks
Entropy
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
Computer crime
security
composability
telecommunication traffic
DDoS Attacks
Protocols
SDN
software defined networking
DDoS
biblio
Message Security Through AES and LSB Embedding in Edge Detected Pixels of 3D Images
Submitted by grigby1 on Mon, 02/08/2021 - 1:01pm
security
Metrics
MSE
peak signal-to-noise ratio
PSNR
pubcrawl
resilience
Resiliency
Scalability
message security
SSIM
Steganography
stereo image processing
structural similarity index measure
Three-dimensional displays
Two dimensional displays
visualization
Image coding
AES-256
AES–256
composability
Cryptography
Data Security
edge detected pixels
edge detection
Entropy
3D cover images
Image edge detection
LSB embedding
LSB steganography
MAE
mean absolute error
mean square error
mean square error methods
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »