Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed system
biblio
Prototyping Self-Managed Interdependent Networks - Self-Healing Synergies against Cascading Failures
Submitted by aekwall on Mon, 03/25/2019 - 9:54am
self-managed interdependent networks
power system faults
power system interconnection
Power system protection
power system reliability
pubcrawl
public domain software
real-world interdependent networks
resilience
self-healing
self-healing mechanism
self-healing networks
self-healing synergies
power grids
self-management
self-management software systems
SFINA
simulation
simulation framework for intelligent network adaptations
Smart Grid
socio-economic effects
Software
software artifact
techno-socio-economic sectors
Unified modeling language
interdisciplinary scope
cascading failure
catastrophic instabilities
complex networks
composability
Computational modeling
digital society
distributed system
failure analysis
general prototyping approach
healer network
interdependent networks
interdependent power networks
Adaptation models
Load flow
Load modeling
modeling
modular design solution
multiplex networks
network interconnection
open source software extension
organizational constraints
power cascading failures
power engineering computing
power flow exchanges
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
A Robust and Secured Cloud Based Distributed Biometric System Using Symmetric Key Cryptography and Microsoft Cognitive API
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
enterprise application base
Symmetric Key Cryptography
security aspects
Resiliency
resilience
registered user information
public key cryptography
pubcrawl
multiple biometric information
Microsoft Windows (operating systems)
Microsoft cognitive face-API
Microsoft cognitive face API
face recognition
face images
face biometric
Face
AES cryptography technique
encryption
distributed system
Compositionality
cloud services
cloud service provider
Cloud Security
Cloud Computing
biometrics (access control)
biometric system
biometric image
biometric authentication system
authorisation
authentication
application program interfaces
APIs
biblio
A Distributed Graph Database for the Data Management of IoT Systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
graph edge property
social computing
security
REST API
Resiliency
pubcrawl
middleware
IoT systems
IoT
Internet of Things
green computing
graph theory
Access Control
graph database operations
graph database
distributed system
distributed graph database
Distributed databases
data management
Conferences
composability
collaboration
application program interfaces
access protocol permissions
biblio
Modeling and Simulation of Extreme-Scale Fat-Tree Networks for HPC Systems and Data Centers
Submitted by thurlwel on Fri, 09/01/2017 - 11:25am
Science of Security
distributed system
fat-tree network
high-performance computing
Parallel discrete event simulation
Science of Security
file
Securing Industrial Control Systems with a Simulation-based Verification System
Submitted by thurlwel on Fri, 09/01/2017 - 11:25am
distributed system
fat-tree network
high-performance computing
Parallel discrete event simulation
Science of Security
Hard Problems
biblio
Secure object tracking protocol for Networked RFID Systems
Submitted by grigby1 on Wed, 03/08/2017 - 2:30pm
security
protocol
Protocols
pubcrawl170112
PUF
radiofrequency identification
radiofrequency identification technology
RFID
secure object tracking protocol
privacy
security protocol description language
SPDL model
supply chains
telecommunication security
tracker
unclonable
visibility
networked RFID system
cryptographic primitive
Cryptographic Protocols
Diffie-Hellman algorithm
distributed system
injection of fake objects
IoT
lawful business operation
Mathematical model
automated claim verification tool Scyther
non-repudiation
NRS
NRS system security
object traceability
object tracking
object visibility
physically unclonable function
biblio
A Big Data Architecture for Large Scale Security Monitoring
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
IP networks
transport protocols
telecommunication traffic
storage management
Spark
security
scalable distributed data storage
scalable distributed data management
network traffic
network intrusion prevention
network intrusion detection
NetFlow records
Monitoring
local enterprise networks
large scale security monitoring
Big Data
HTTP traffic
honeypot data
Hadoop
forensic analysis
DNS data
distributed system
Distributed databases
Digital Forensics
Data mining
data exploitation
data correlation schemes
Correlation
computer network security
Big Data architecture
biblio
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
Submitted by BrandonB on Thu, 04/30/2015 - 11:58am
malicious unmanned air vehicles
Weapons
unmanned air vehicles (UAVs)
uav
sensors
security of data
security
reckless attacker behaviors
random attacker behaviors
Pricing
opportunistic attacker behaviors
multiagent system
multi-agent systems
Monitoring
actuators
malicious attacks
Intrusion Detection
IDS
Gears
distributed system
BRUIDS
behavior rule specifications
autonomous aerial vehicles
ant-colony clustering model
ant colony optimisation
airborne system
adaptive intrusion detection
« first
‹ previous
1
2