Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Proactive DDoS attack detection and isolation
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
legitimate clients
Servers
security controls
resource allocation
Resiliency
pubcrawl
proxy level
proactive DDoS attack isolation
proactive DDoS attack detection
MTD
Monitoring
Migration
Metrics
Load management
load balancing
Attack proxy
IP networks
insider-assisted DDoS attack mitigation
Insider-assisted DDoS attack
Human behavior
EDIP
early detection-and-isolation policy
distributed denial of service
DDoS attack detection
Data processing
cyber threat
Cyber Attacks
computer network security
Computer crime
composability
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
IP networks
Semantics
Routing
Resilient Networks
Resiliency
Reliability
pubcrawl
Power Grid
overlay networks
North America
network infrastructure
Monitoring
malicious attacks
composability
IP infrastructure
intrusion-tolerant overlay implementation
intrusion-tolerant network service
intrusion tolerance
internet
high-value applications
global cloud
Europe
East Asia
critical infrastructure
computer network security
biblio
Detection of compromised email accounts used for spamming in correlation with origin-destination delivery notification extracted from metadata
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
ODDN
Unsolicited electronic mail
unsolicited e-mail
spam messages
spam
Servers
remote SMTP server
pubcrawl
Postal services
phishing messages
Phishing
pattern classification
origin-destination delivery notification extracted
Origin-Destination Delivery Notification
authentication
metadata
IP networks
incoming junk mail detection
Human Factors
Human behavior
hacked
geographical origin
encrypted phishing
delivery status notification
data privacy
compromised email account detection
compromised email account
biblio
An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
human beings
Servers
security
SDN
pubcrawl
Observers
networks
IP networks
Human Factors
CAPTCHA
Human behavior
delays
DDoS attack mitigation
DDoS
Computer crime
composability
captchas
biblio
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Submitted by grigby1 on Wed, 12/20/2017 - 1:03pm
privacy
pubcrawl
Human behavior
Human Factors
composability
Servers
Access Control
IP networks
Relays
CAPTCHA
captchas
human beings
biblio
FOGG: A Fog Computing Based Gateway to Integrate Sensor Networks to Internet
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
wireless sensor networks
sensor security
sensor networks
sensor network integration
network servers
IoT gateway
IoT devices
internetworking
information centric networking
ICN
heterogeneous sensor networks
FOGG
fog computing based gateway
Fog computing
edge computing
security
Logic gates
IP networks
internet
Cloud Computing
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
security of data
X.509 certificates
X.509 Certificate
Web users
Web servers
Web browser validation process
Web Browser Security
Web browsers
Web browser behaviour
TLS connection validation
standards
Browsers
Resiliency
Public key
pubcrawl
Protocols
online front-ends
Metrics
IP networks
Human behavior
Certificate Validation
biblio
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
integrity
test structures
system-on-chips
system-on-chip
SoC integration
Security Policies Analysis
secure microprocessors
secret keys
pubcrawl
policy-based governance
memory read-write functions
Logic gates
IP networks
internal modules
asset protection
information leakage vulnerabilities
encryption algorithms
encryption
Discrete Fourier transforms
design-for-test exploits
design for testability
Cryptography
Controllability
control finite state machines
confidentiality
collaboration
availability policies
automated security vulnerability analysis framework
biblio
Security in Lightweight Network Function Virtualisation for Federated Cloud and IoT
Submitted by grigby1 on Tue, 12/12/2017 - 1:29pm
IoT security
security
Resiliency
pubcrawl
Protocols
network function virtualisation
Metrics
Logic gates
IP networks
6LoWPAN
Internet of Things
Human Factors
Human behavior
federation
computer architecture
composability
Communication networks
Cloud Computing
biblio
Security versus reliability study for power-limited mobile IoT devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:29pm
Ad Hoc Network Security
composability
Human behavior
Human Factors
Internet of Vehicles
IoT security
IP networks
Mathematical model
Metrics
pubcrawl
Relays
Reliability
Resiliency
security
vehicular ad hoc networks
Wireless communication
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »