Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Resilient System-on-Chip Designs With NoC Fabrics
Submitted by grigby1 on Thu, 09/16/2021 - 12:10pm
computer architecture
Computer bugs
Fabrics
IP networks
NoC security
pubcrawl
resilience
Resiliency
resilient architecture
Resilient Security Architectures
security
SoC Security
system-on-chip
trusted SoC
untrusted IPs
biblio
Mitigating HTTP GET FLOOD DDoS Attack Using an SDN Controller
Submitted by grigby1 on Tue, 09/07/2021 - 2:23pm
IP networks
Web servers
Switches
SDN
Resiliency
resilience
pubcrawl
Protocols
Open Flow
Metrics
Blacklist
Human behavior
flow table
Floods
denial-of-service attack
DDOS attacks detection
DDoS attack mitigation
DDoS Attack
Computer crime
composability
biblio
SDN/NFV-Based DDoS Mitigation via Pushback
Submitted by grigby1 on Tue, 09/07/2021 - 2:23pm
IP networks
Servers
SDN
Resiliency
resilience
pushback
pubcrawl
pattern generation
NFV
Metrics
Aggregates
Human behavior
DDOS attacks detection
DDoS attack mitigation
DDoS
Computer crime
composability
collaboration
Cloud Computing
biblio
Blacklisted IP Distribution System to Handle DDoS Attacks on IPS Snort Based on Blockchain
Submitted by grigby1 on Tue, 09/07/2021 - 2:22pm
IP networks
testing
smart contracts
smart contract
Servers
Resiliency
resilience
pubcrawl
Metrics
IPS
Blacklisted IP
Human behavior
denial-of-service attack
DDOS attacks detection
DDoS Attack Prevention
DDoS attack mitigation
DDoS
Computer crime
composability
blockchain
biblio
Blockchain Based DDoS Mitigation Using Machine Learning Techniques
Submitted by grigby1 on Tue, 09/07/2021 - 2:22pm
KNN (K-Nearest Neighbors) Algorithm
Servers
Resiliency
resilience
Random Forest
pubcrawl
Peer-to-peer computing
Metrics
machine learning (ML)
machine learning
blockchain
IP networks
Human behavior
feature extraction
Decision Tree
DDOS attacks detection
DDoS attack mitigation
DDoS (Distributed Daniel of Service)
Computer crime
composability
biblio
Slow Hypertext Transfer Protocol Mitigation Model in Software Defined Networks
Submitted by grigby1 on Tue, 09/07/2021 - 2:21pm
Protocols
Web servers
Support vector machines
support vector machine
Software Defined Network
slow distributed denial of service
slow DDoS mitigation
Resiliency
resilience
pubcrawl
composability
Metrics
IP networks
Human behavior
genetic algorithms
genetic algorithm
denial-of-service attack
DDOS attacks detection
DDoS attack mitigation
Computer crime
biblio
Mitigation of Combined DDoS Attack on SDN Controller and Primary Server in Software Defined Networks Using a Priority on Traffic Variation
Submitted by grigby1 on Tue, 09/07/2021 - 2:21pm
Metrics
Topology
standards
spoofed IP address
software defined networking
Servers
SDN
Resiliency
resilience
pubcrawl
composability
IP networks
idle timeout
Human behavior
hard time out
DDOS attacks detection
DDoS attack mitigation
DDoS
control systems
Computer crime
biblio
Blockchain-Powered Software Defined Network-Enabled Networking Infrastructure for Cloud Management
Submitted by aekwall on Tue, 09/07/2021 - 10:14am
security
IP networks
blockchain
computer architecture
Cloud Computing
smart contracts
Bandwidth
pubcrawl
Resiliency
Internet of Things
Cloud Management
networking infrastructure
software defined networking (SDN)
controller area network security
cyber-physical systems
biblio
SDN-based Malware Detection and Mitigation: The Case of ExPetr Ransomware
Submitted by aekwall on Tue, 08/31/2021 - 10:42am
composability
Cryptography
ExPetr ransomware
IP networks
malware detection
Metrics
OpenFlow
POX controller
Protocols
pubcrawl
Ransomware
Resiliency
SDN
Servers
biblio
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware
Submitted by aekwall on Tue, 08/31/2021 - 10:42am
composability
Crypto-Ransomware
Cryptography
Cybersecurity
encryption
IP networks
Metrics
operating systems
pubcrawl
Ransomware
Ransomware Analysis
Resiliency
telecommunication traffic
Workstations
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »