Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
DDoS
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
IP networks
pubcrawl
Resiliency
computer network security
microprocessor chips
wireless sensor networks
intrusion detection system
Wireless communication
composability
telecommunication traffic
multiprocessing systems
DDoS Attacks
Virtual machining
virtual machines
DDoS
resilience
operating systems (computers)
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
Central Processing Unit
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
biblio
AI-Powered Honeypots for Enhanced IoT Botnet Detection
Submitted by grigby1 on Tue, 03/09/2021 - 2:24pm
AI-powered honeypots
botnet
botnets
Cloud Computing
composability
compromised devices
Computer crime
Computer hacking
computer network security
connected devices
conventional security architectures
DDoS
denial-of-service attack
enhanced IoT botnet detection rate
hackers
honeypots
Internet of Things
invasive software
IoT
IoT network
learning (artificial intelligence)
malicious activities
malicious software
malware
malware spread
Metrics
MITM
novel hybrid Artificial Intelligence-powered honeynet
potential botnet existence
pubcrawl
resilience
Resiliency
revolutionary expandable network
security
security gaps
Servers
upcoming security mechanism
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
botnet
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
cyberattacks
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
identity theft
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
pubcrawl
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 1:00pm
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Computer crime
Entropy
composability
telecommunication traffic
SDN
software defined networking
Attack detection
Switches
microsoft windows
DDoS
network architecture
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service attack
DDoS attack detection method
control logic
DDoS traffic formation
forwarding logic
network cyber security
SDN networks
φ-entropy
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:59pm
learning (artificial intelligence)
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
Global Positioning System
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
DDOS attacks detection
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
biblio
Distributed Denial of Service Defense in Software Defined Network Using OpenFlow
Submitted by grigby1 on Tue, 02/16/2021 - 12:45pm
security
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
Computer crime
Entropy
composability
telecommunication traffic
DDoS Attacks
Protocols
SDN
software defined networking
DDoS
network security threats
distributed denial of service attacks
denial-of-service attack
control plane
OpenFlow
application plane
centralized control
data plane
Distributed Denial of Service defense
dynamic threshold
exponentially weighted moving average algorithm
moving average processes
network architecture solution
OpenFlow protocol
Renyi entropy
Software Defined Network
traditional network system
dynamic networks
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
security of data
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
wireless LAN
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
covered direction-finding
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
packet loss avoidance
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
biblio
Real Time DDoS Intrusion Detection and Monitoring Framework in 6LoWPAN for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 1:27pm
DDoS
Internet of Things
security
pubcrawl
composability
6LoWPAN
sensors
Resiliency
Contiki
biblio
Machine-Learning Based DDOS Attack Classifier in Software Defined Network
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
security of data
Computer crime
computer network security
IP networks
telecommunication traffic
telecommunication security
computer network management
machine learning algorithms
SDN network
software defined networking
Support vector machines
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
SVM
SDN
Switches
Software Defined Network
Predictive Metrics
SDN architecture
service attacks
DDoS Attacks
centralized control
centralized controller
DDoS
linear SVM
machine-learning based DDOS attack classifier
network administrators
normal attack traffic
polynomial SVM
programmable capability
RYU
RYU SDN controller
scapy
biblio
On the Large-Scale Traffic DDoS Threat of Space Backbone Network
Submitted by grigby1 on Tue, 12/01/2020 - 1:46pm
Bandwidth
bandwidth resource
composability
Computer crime
computer network security
data communication
Data Transmission
DDoS
DDoS attackers
defense
denial-of-service attack
global coverage
ground networks
IDS
internet
intrusion detection system
large-scale traffic DDoS threat
pubcrawl
reflection
reflection amplification attack
reflection amplification attacks
resilience
Resiliency
satellite communication
satellite network
satellite networks
Satellites
service delivery
space backbone network
space communication links
Space vehicles
telecommunication traffic
terminal devices
1
2
3
4
5
6
7
8
9
next ›
last »