Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Detecting and Analyzing Zero-Day Attacks Using Honeypots
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
Predictive Metrics
Zero-day attacks
zero-day attack detection
zero-day attack analysis
Zero Day Attacks and Defense
Virtual machining
virtual machines
virtual machine
Snort intrusion prevention system
Snort intrusion detection system
security vulnerability
security
Resiliency
pubcrawl
Protocols
Zero day attacks
Ports (Computers)
operating systems
malware
IP networks
invasive software
intrusion detec- tion/prevention system
information security domain
honeypot system
honeypot
Dictionaries
computer network security
computer network
composability
defense
biblio
Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
mediation
Zero-day attacks
zero-day attack
Zero Day Attacks and Defense
testing
Survivability
security
Resiliency
Red Team exercise
record & replay
pubcrawl
Predictive Metrics
novel attacks
network-facing application
network service
Monitoring
Zero day attacks
IP networks
Fires
File systems
execution management environment
empirical evaluation
CTF tournament
critical system
computer network security
composability
capture the flag tournament
app store
adaptive security
A3 environment
A3 defensive technology
defense
biblio
TCP/IP and ICN Networking Technologies for the Internet of Things: A Comparative Study
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
caching
TCPIP
TCP/IP stack
TCP/IP
packet level security
naming
IP-based technologies
IoT requirements
IoT environments
interconnecting resource-constrained devices
information-centric networks
information-centric networking paradigm
ICN networking technologies
communication paradigms
computer network security
Low-Power and Lossy Networks
6LoWPAN
Routing protocols
internet
composability
pubcrawl
Resiliency
transport protocols
computer architecture
IoT applications
security
Internet of Things
IP networks
biblio
IPv6-Based Smart Grid Communication over 6LoWPAN
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
local electric transformer
CAS
customer agents
Electric Grid
electric utilities
energy data
energy usage
future demand growth
IEEE 2030.5
IEEE 802.15 Standard
IPv6-based smart grid communication system
Carleton University
Low-Power and Lossy Networks
MESH network
OpenLab IEEE 802.15.4 chips
Routing Protocol
self-healing mesh network
Smart City concept
transformer agent
Two-Way Communication
two-way communication system
utility
6LoWPAN
IoT
RPL
IP networks
Resiliency
pubcrawl
composability
Routing protocols
Routing
Reliability
smart power grids
security
Smart Grids
Smart Grid
Mesh networks
wireless LAN
Zigbee
communication technologies
Communication Network
personal area networks
IPv6
biblio
Data Acquisition Network and Application System Based on 6LoWPAN and IPv6 Transition Technology
Submitted by aekwall on Mon, 01/13/2020 - 11:04am
personal area networks
wide area networks
tunnel
rich IPv6 address
multiservice data storage
low-power wide-area network wireless communication technology
IPv6
IPv4 address exhaustion
internal sensor network
device access management
data acquisition network
application system
affair data service
actual uploaded river quality data
6to4 tunnel
6to4
Monitoring
internetworking
data packet
sensors
6LoWPAN
data acquisition
internet
Routing
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
Servers
IP networks
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
internet
traffic classifier
telecommunication traffic
Servers
Resiliency
resilience
pulse wave type DDoS-attack prevention
pubcrawl
network technologies
Network
Metrics
IP networks
botnet
Human behavior
firewalls
firewall
dpi
DDoS Attack Prevention
DDoS attack detection
DDoS
Computer crime
composability
Communication networks
biblio
Prevention and Mitigation of DNS Based DDoS Attacks in SDN Environment
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
IP networks
telecommunication traffic
taxonomy
Software Defined Networks
software defined networking
Servers
SDN environment
SDN
Resiliency
resilience
pubcrawl
Protocols
Metrics
IP spoofing
attack packets
internet
Human behavior
domain name system protocol
DNS protocol
DNS
distributed denial-of-service attack
DDoS Attack Prevention
DDoS Attack
DDoS
computer network security
Computer crime
composability
biblio
DDoS Mitigation: Decentralized CDN Using Private Blockchain
Submitted by aekwall on Wed, 12/18/2019 - 1:24pm
Bandwidth
public administration
private blockchain
military organizations
military agencies
government agencies
distributed CDN Schema
Content Delivery Network(CDN)
content delivery network
CDN system
DDoS attack mitigation
resilience
contracts
military computing
Computer crime
Companies
internet
Metrics
composability
pubcrawl
Human behavior
Cryptography
Servers
IP networks
distributed denial of service attacks
ddos mitigation
computer network security
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »