Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Computer crime
biblio
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
Cloud Computing
Computer crime
control systems
denial-of-service attack
IP networks
Network reconnaissance
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
Servers
biblio
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection
Submitted by grigby1 on Tue, 02/23/2021 - 1:46pm
learning (artificial intelligence)
machine learning
security
Data mining
convolutional neural nets
Intrusion Detection
pubcrawl
Metrics
resilience
Resiliency
computer network security
cyber security
intrusion detection system
Computer crime
composability
cyber-attacks
software reliability
neural network
network intrusion detection
Scalability
software quality
NSL-KDD dataset
ADFA dataset
cyber-attackers
host-level IDS
host-level intrusion detection
IDS field
network-level intrusion detection
scalable neural-network-based hybrid IDS framework
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 1:24pm
Android (operating system)
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
device manufacturers
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
open-source nature
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
resilience
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
biblio
Early detection of DDoS based on φ-entropy in SDN networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:00pm
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Computer crime
Entropy
composability
telecommunication traffic
SDN
software defined networking
Attack detection
Switches
microsoft windows
DDoS
network architecture
information entropy
denial-of-service attack
DDoS attack detection
distributed denial of service attack
DDoS attack detection method
control logic
DDoS traffic formation
forwarding logic
network cyber security
SDN networks
φ-entropy
biblio
DDoS Attacks Detection by Using Machine Learning Methods on Online Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
learning (artificial intelligence)
machine learning
cyber security
Intrusion Detection
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
Topology
random forests
Support vector machines
Computer crime
composability
nearest neighbour methods
DDoS
Random Forest
Global Positioning System
Handheld computers
denial-of-service attack
distributed denial of service attacks
multilayer perceptrons
Cyber Attacks
hypermedia
DDoS attack detection
C-support vector machine
DDOS attacks detection
detection accuracy rates
Hafnium compounds
HTTP flood
hypertext transfer protocol
k-nearest neighbor
multi layer perceptron
online systems
TCP SYN flood
biblio
Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
Internet of Things
feature extraction
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
IoT devices
internet
Computer crime
Entropy
composability
real-time systems
Protocols
SDN
software defined networking
Switches
computer networks
DDoS attack detection
software-defined networking
categorized partial-flows
DDoS attack detection capabilities
OpenFlow
openflowbased switch capabilities
packet count entropies
Partial flow
real-time entropy features
SDN technology
biblio
A Comprehensive Approach for DDoS Attack Detection in Smart Home Network Using Shortest Path Algorithm
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
feature extraction
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
network security
Protocols
telecommunication traffic
Computer crime
composability
Time factors
Smart homes
DDoS Attack
home computing
DDoS attack detection
Defence Mechanism
distributed denial of service attack
Graph Algorithm
machine learning algorithms
shortest path algorithm
smart home network
biblio
DDoS attack Detection and Mitigation in Software Defined Networks
Submitted by grigby1 on Tue, 02/16/2021 - 11:58am
Servers
IP networks
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
internet
Computer crime
Entropy
composability
computer network management
telecommunication traffic
Floods
invasive software
telecommunication control
software defined networking
DDoS attack mitigation
botnet
transport protocols
denial-of-service attack
network flow data
DDoS attack detection
distributed denial of service
distributed denial of service attack
distributed source
HTTP attacks
network management complexity
Ping flood attack
slow HTTP attack
Software Defined Networks
TCP flags
TCP SYN flood attack
biblio
Improving Performance of Collaborative Source-Side DDoS Attack Detection
Submitted by grigby1 on Tue, 02/16/2021 - 11:57am
collaboration
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
computer network security
network security
telecommunication traffic
Computer crime
Communication networks
composability
denial-of-service attack
collaborative attack detection technique
collaborative source-side DDoS attack detection method
Collaborative Source-side detection
DDoS Attack
detecting performance
detection methods
distributed denial-of-service attacks
false positive rate
individual attack detection
SDN IDPS
source-side Denial-of-Service
source-side detection
weighted detection results
DDoS attack detection
biblio
Distributed Denial of Service Defense in Software Defined Network Using OpenFlow
Submitted by grigby1 on Tue, 02/16/2021 - 11:45am
security
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
Computer crime
Entropy
composability
telecommunication traffic
DDoS Attacks
Protocols
SDN
software defined networking
DDoS
network security threats
distributed denial of service attacks
denial-of-service attack
control plane
OpenFlow
application plane
centralized control
data plane
Distributed Denial of Service defense
dynamic threshold
exponentially weighted moving average algorithm
moving average processes
network architecture solution
OpenFlow protocol
Renyi entropy
Software Defined Network
traditional network system
dynamic networks
1
2
3
4
5
6
7
8
9
…
next ›
last »