Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
distributed processing
biblio
Research on the Configuration Management of Complex Equipment Based on Identity Resolution
Submitted by aekwall on Fri, 09/30/2022 - 1:38pm
Scalability
pubcrawl
Resiliency
Human behavior
Industries
Data collection
Correlation
Identity management
Configuration Management
distributed processing
identity resolution
industrial internet
intelligent databases
Packaging
Rail transportation
biblio
DDoS Attack Detection System using Apache Spark
Submitted by grigby1 on Wed, 04/13/2022 - 9:31am
Scalability
distributed processing
Classification of DDos attack
DDoS attack detection
HDFS
denial-of-service attack
DDoS Attack
Cluster Computing
apache spark
Training
Metrics
Decision trees
telecommunication traffic
Resiliency
resilience
Human behavior
pubcrawl
machine learning
biblio
Toward a Network Intrusion Detection System for Geographic Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
network intrusion detection system
knowledge based systems
knowledge bases
known computer attack detection
MAS
Multi Agent System
multi-agent systems
multiagent paradigm
multiagent systems
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
security
security of data
time detection
unknown computer attack detection
distribution
autonomous agents
autonomy
Big Data
Big networks
DIDS
distributed file system
distributed intrusion detection system
distributed processing
Anomaly Detection
expert systems
geographic data security
geographic information systems
Geographical System
GIS.
Human behavior
IDS
biblio
A Decentralized, Privacy-preserving and Crowdsourcing-based Approach to Medical Research
Submitted by grigby1 on Thu, 03/04/2021 - 2:06pm
medical computing
ZK-SNARK
zero-knowledge proof
zero trust
zero knowledge argument of knowledge
verifiable computation
Trusted Computing
smart contracts
Scalability
Resiliency
resilience
pubcrawl
privacy
policy-based governance
mutual trust
medical research
blockchain
machine learning
Human Factors
health data privacy
faces
distributed processing
Distributed databases
decentralized platform
data privacy
cybernetics
Cryptography
crowdsourcing platform
crowdsourcing
commitment schemes
commit-and-prove
blockchains
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 12:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
Lightweight Crypto-Assisted Distributed Differential Privacy for Privacy-Preserving Distributed Learning
Submitted by aekwall on Mon, 01/11/2021 - 12:40pm
mean square error methods
unbiased encoding
trusted server
three-layer encryption protocol
private training data
privacy-preserving distributed learning
privacy guarantees
lightweight crypto-assisted distributed differential privacy
floating-point values
distributed learning
distributed differential privacy
centralized differential privacy
privacy-utility tradeoff
Privacy-preserving
mean squared error
Scalability
differential privacy
privacy
composability
pubcrawl
Human behavior
Resiliency
privacy leakage
learning (artificial intelligence)
Data models
Cryptographic Protocols
distributed processing
data privacy
encryption
Servers
biblio
Secure Determinant Codes: Type-II Security
Submitted by grigby1 on Tue, 12/15/2020 - 12:28pm
resilience
type-II security
type II secrecy
storage management
security of data
security
secure exact-repair regenerating codes
secure determinant codes
secrecy constraint guarantees
Resiliency
coding theory
repair bandwidth
pubcrawl
per-node storage capacity
Metrics
ℓ compromised nodes
distributed storage systems
distributed processing
Cryptography
Compositionality
biblio
A Multilayer Perceptron-Based Distributed Intrusion Detection System for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:09am
MultiLayer Perceptron neural network
wireless sensor networks
vehicular ad hoc networks
Vehicle to Vehicle communication
VANET
V2V communication
telecommunication security
telecommunication computing
sensors
security attacks
Roads
Resiliency
resilience
pubcrawl
multilayer perceptrons
Accidents
Multilayer Perceptron
MLP
Metrics
IoV network
Intrusion Detection
Internet of vehicles network
Internet of Vehicles (IoV)
Internet of Vehicles
Human Factors
embedded systems
distributed processing
distributed intrusion detection system
Ad hoc networks
1
2
3
4
5
6
next ›
last »