Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Floods
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 1:47pm
Support vector machines
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
wireless sensor networks
composability
telecommunication computing
sensors
Denial of Service attacks
Floods
service attacks
Classification algorithms
neural nets
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
smart appliances
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
Servers
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
internet
Computer crime
Entropy
composability
computer network management
telecommunication traffic
Floods
invasive software
telecommunication control
software defined networking
DDoS attack mitigation
botnet
transport protocols
denial-of-service attack
network flow data
DDoS attack detection
distributed denial of service
distributed denial of service attack
distributed source
HTTP attacks
network management complexity
Ping flood attack
slow HTTP attack
Software Defined Networks
TCP flags
TCP SYN flood attack
biblio
Abnormal Bus Data Detection of Intelligent and Connected Vehicle Based on Neural Network
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Automotive engineering
security of data
intrusion detection system
Scalability
Resiliency
pubcrawl
detection
standards
neural nets
Vulnerability
data analysis
neural network
Logic gates
Floods
Compositionality
attack
Intelligent Transportation Systems
connected vehicles
data centers
abnormal bus data
abnormal bus data analysis
abnormal bus data detection
Intelligent vehicles
optimized neural network
Intelligent Data Security
Intelligent Data and Security
biblio
DDoS Attacks Detection and Mitigation in SDN Using Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
Computer crime
computer network security
control systems
DDoS
DDoS attack detection
distributed denial-of-service attack
Floods
J48
k-nearest neighbors
machine learning
Measurement
Metrics
nearest neighbour methods
network topology
privacy
pubcrawl
Random Forest
random forests
SDN
SDN network
security threat protection
software defined networking
support vector machine
Support vector machines
threat vectors
WEKA
biblio
A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking
Submitted by grigby1 on Tue, 01/21/2020 - 10:26am
ICN architectures
future Internet architecture
Floods
DoS attacks
Denial of Service attacks
delays
Data Security
data requests
congestion-aware interest flooding attacks detection mechanism
congestion-aware IFA attack detection
computer science
computer network security
computer architecture
Information Centric Network
Information Centric Networks
information-centric networking architectures
interest flooding attacks
internet
IP networks
named data networking
NDN router
network congestion
pubcrawl
resilience
Resiliency
Scalability
security
telecommunication network routing
biblio
Modeling and evaluation of a new IoT security system for mitigating DoS attacks to the MQTT broker
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
IoT
computer network security
IDS
Monitoring
Internet of Things
security
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
composability
Metrics
quality of service
Proposals
Floods
DoS
actuators
Denial of Service attacks
DoS attacks
generic IoT system
high interaction
high mobility
host Intrusion Detection System
human activities
human control
Internet of Things phenomenon
IoT security system
low power devices
Message Queue Telemetry Transport protocol
MQTT
MQTT broker
queueing theory
security over IoT
structured activities
telemetry
actuator security
biblio
Detection and Prevention of DoS Attacks on Network Systems
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
anomalous express
botnet
Cloud Computing
composability
Computer crime
computer network security
convergence
DDoS
DDoS ambushes
DDoS Attack
DDoS Attack Prevention
denial
distributed denial of service strike
DoS attacks
flood
Floods
Human behavior
incorporating establishment
internet
Internet development
IoT
IoT contraptions
malevolent undertaking
masterminded resources
Metrics
mishandled machines
network systems
Organizations
PC structures
pubcrawl
resilience
Resiliency
Servers
standard action
strike action
biblio
DDoS Prevention Using D-PID
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
attacks
composability
Computer crime
computer network security
Conferences
control systems
D-PID usage
D-PIDs
DDoS
DDoS Attack Prevention
DDoS Attacks
DDoS prevention
distributed denial of service attack
Dynamic Path Identifiers
Floods
Heuristic algorithms
Human behavior
inter-domain path connector
Inter-domain routing
inter-domain routing component
internet
Metrics
PIDs
pubcrawl
resilience
Resiliency
Routing
Servers
Static Path Identifiers
telecommunication network routing
biblio
Reachability Analysis as a Design Tool for Stormwater Systems: Towards Planning in the Presence of Stochastic Surface Runoff
Submitted by willirn1 on Wed, 08/28/2019 - 9:31am
Dams Sector
Water and Wastewater Systems Sector
Critical Infrastructure
critical infrastructure
Dams Sector
dynamic systems
Floods
human impacts. hydrometeorology
hydrologyde
reachability
stormwater infrastructure
Water and Wastewater Systems Sector
biblio
SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET
Submitted by aekwall on Mon, 06/10/2019 - 9:14am
Artificial Intelligence
Bay Estimator
Clustering algorithms
composability
Compositionality
Firewalls (computing)
Floods
MANET
MANET Attack Detection
MANET security
Metrics
mobile ad hoc networks
Monitoring
probability
pubcrawl
Resiliency
Routing
Servers
SYN flood attack
1
2
3
next ›
last »