Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources
Submitted by BrandonB on Thu, 04/30/2015 - 2:13pm
Cloud Computing
delays
IP networks
security
Synchronization
Throughput
Virtualization
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
biblio
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
Inter-operable Heterogeneous Storage
trust boundaries
storage technologies
storage systems
storage management
Servers
Self Certifying File Systems
public keys
public key cryptography
Public key
Prototypes
network layer
Name Orientated Networking (NON)
IP networks
CCFS
integrity verification
information-centric networking
information networks
Information Centric Networks (ICN)
Google
File systems
file hashes
Delay Tolerant Networking (DTN)
cryptographically-curated file system
cryptographically strong content identifiers
Cryptographically Curated File System (CCFS)
Content Centric Networking (CCN)
content authentication
biblio
Network Intrusion Detection System using attack behavior classification
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
Neural networks
unauthorized accesses
TDNN neural network structure
TDNN neural network
reconnaissance attacks
Protocols
Probes
preprocessor
Ports (Computers)
port scan attacks
Port scan
Pattern recognition
pattern classification
packet capture engine
NIDS
alert module
neural nets
network probe attacks
Network probe attack
network intrusion detection system
IP networks
Intrusion Detection Systems
Intrusion Detection
host-based intrusion detection system
host sweep attacks
Host sweep
HIDS
computer security systems
computer network security
attack behavior classification
biblio
Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique
Submitted by BrandonB on Thu, 04/30/2015 - 1:21pm
Intermediate System
TTL
Servers
Round Trip Time (RTT)
Receivers
Probabilistic logic
probabilistic hop count filtering
probabilistic HCF techniques
packet filtering
network bandwidth jam
mitigation techniques
MATLAB 7
IP spoofing
IP networks
IP addresses
Broadband communication
information filtering
illegitimate packet filtering
host resources exhaustion
Hop Count Filtering (HCF)
Hop Count
Educational institutions
DPHCF-RTT packet filtering technique
Distributed Probabilistic HCF (DPHCF)
distributed probabilistic HCF
distributed DoS attacks
DDoS
conventional hop count filtering
conventional HCF techniques
computer network security
biblio
Fingerprinting Internet DNS Amplification DDoS Activities
Submitted by BrandonB on Thu, 04/30/2015 - 1:19pm
geolocation
storage capacity 720 Gbit
sensors
packet size
network-layer
Monitoring
IP networks
Internet-scale DNS amplification DDoS attacks
internet
Grippers
anti-spam organizations
fingerprinting Internet DNS amplification DDoS activities
distributed denial of service
detection period
darknet space
cyber security intelligence
computer network security
Computer crime
backscattered analysis
attack duration
biblio
Bandwidth Distributed Denial of Service: Attacks and Defenses
Submitted by BrandonB on Thu, 04/30/2015 - 1:18pm
denial of service
Servers
Routing protocols
network congestion
legitimate traffic
IP networks
internet
DoS mitigation
DoS attacks
DoS
Bandwidth
DDoS
computer security
computer network security
Computer crime
BW-DDoS defense
BW-DDoS attacks
brute force mechanisms
bandwidth flooding
bandwidth distributed denial-of-service
biblio
User behaviour modelling based DDoS attack detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:16pm
expectation maximization
user modelling
user modeling
user behaviour modelling
telecommunication traffic
signal processing
network system
Mathematical model
IP networks
Human Factors
Adaptation models
EM
distributed denial of service
destination IP traffic
DDoS attack detection
DDoS
Conferences
computer network security
Computer crime
Anomaly Detection
biblio
TDFA: Traceback-Based Defense against DDoS Flooding Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 1:15pm
IP networks
traffic control component
traffic control
traceback-based defense
trace back component
telecommunication traffic
TDFA
spoofed IP addresses
quality of service
Protocols
packet forwarding rate
packet filtering
network security problems
IP Traceback
attack packets
internet
Image edge detection
Filtering
distributed denial of service attack
Deterministic Flow Marking
detection component
DDoS flooding attacks
DDoS Attack
computer network security
Computer crime
Bandwidth
attacking traffic
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 11:53am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
next ›
last »