Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Trustworthiness Optimization of Industrial Cluster Network Platform Based on Blockchain
Submitted by aekwall on Mon, 03/11/2019 - 9:38am
Information services
trustworthiness optimization
trustworthiness
Trusted Computing
smart contracts
small-to-medium enterprises
small and medium-sized enterprises
security of data
pubcrawl
optimization
optimisation
network platform
information trustworthiness
Analytical models
information service platform
Industries
industrial cluster network platform
industrial cluster
Economics
Distributed databases
data layer
composability
collaboration
blockchain
Application Layer
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices
biblio
Detection of Spam E-mails with Machine Learning Methods
Submitted by aekwall on Mon, 02/25/2019 - 10:42am
naïve Bayes classifier
vector space model
Unsolicited electronic mail
unsolicited e-mail
spam filtering
spam e-mails
spam detection
security of data
Scalability
pubcrawl
Postal services
pattern classification
offensive content
Analytical models
Metrics
machine learning methods
machine learning
learning (artificial intelligence)
internet
Human behavior
Filtering
e-mail filtering
e-mail communication
content information
Bayes methods
biblio
A quantifiable Attack-Defense Trees model for APT attack
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
trees (mathematics)
probability
network attack
expert systems
Eigenvalues and eigenfunctions
attack-defense trees model
Attack-Defense Trees
APT attack
advanced persistent threat attacks
advanced persistent threats
security
Scalability
Resiliency
Metrics
Human behavior
pubcrawl
Buildings
Analytical models
security of data
analytic hierarchy process
biblio
Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
malware
Weapons
visualization
threat taxonomy
taxonomy
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
persistent forms
organizations cyber assets
Metrics
advanced persistent threat attacks
intelligent forms
Human behavior
cyber situation awareness
cyber kill chain based threat taxonomy
Cyber Kill Chain
cyber common operational picture
command and control systems
Chained Attacks
attack tactics
Analytical models
adversarial behavior
advanced persistent threats
biblio
Moving Target Defense Against Advanced Persistent Threats for Cybersecurity Enhancement
Submitted by grigby1 on Mon, 01/21/2019 - 11:36am
intrusion prevention systems
cybersecurity attacks
cybersecurity enhancement
deception techniques
enterprise-level organizations
IKC models
IKC progression
IKC-based intrusion activities
Intrusion Kill Chain (IKC)
intrusion kill chain model
complex multi-step attack scenario
moving target defense
moving target defense (MTD)
MTD techniques
network assets
network-based services
Networked Infrastructure
Reconnaissance
security concerns
Intrusion Detection
Analytical models
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
invasive software
Cybersecurity
computer network security
Intrusion Detection Systems
Organizations
IP networks
abstraction levels
Advanced Persistent Threat (APT)
advanced persistent threats
APT attack strategies
APT attacks
APTs
biblio
Analytics as a service architecture for cloud-based CDN: Case of video popularity prediction
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
CDN logs
video popularity prediction
user generated videos
scattered caches
RESTful Web services
quality of service
prediction services
NoSQL databases
NoSQL database
k-means clustering prediction model
highly variable UGV popularity
end-user content delivery network requests
end-user behaviour
dynamic model training
cloud-based CDN
Cloud Computing
analytics as a service architecture
pattern clustering
web services
Web Caching
cache storage
computer architecture
Training
Streaming media
Scalability
Resiliency
Metrics
pubcrawl
Analytical models
Predictive models
biblio
Security event analysis in XBee-based wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:05pm
network nodes
XBee circuits
wireless sensor networks
wireless mesh networks
wireless mesh network
Wireless communication
telecommunication security
software/hardware assets
security of data
security event collection
security event analysis
security event
Security analysis
security
resilience
pubcrawl
Analytical models
Modeling Attacks
mobile network
microcontrollers
Metrics
Mesh networks
intruder models
data flows
data correlation
cyber-physical systems
cyber-physical security events
Crisis Management
composability
Communication system security
communication protocols
biblio
A Trace-Based Performance Study of Autoscaling Workloads of Workflows in Datacenters
Submitted by grigby1 on Mon, 12/10/2018 - 10:42am
resources
operational behavior
provisioning policies
pubcrawl
real world traces
resilience
Resiliency
resource allocation
resource management
Monitoring
Scalability
scheduling
simulation
Task Analysis
time related autoscaling complexity metrics
trace based simulation
work factor metrics
allocation policies
memory related autoscaling complexity metrics
Measurement
Human Factors
elasticity metrics
datacenters
datacenter operators
Data models
customer experience
computer centres
computational complexity
Cloud Computing
autoscaling
autoscaler
application domains
Analytical models
biblio
Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
Internet of battlefield things
wireless networks
war scenarios
telecommunication security
sensors
Scalability
Resiliency
resilience
pubcrawl
Poisson point process
mission-critical data
military communication
iobt
Internet of Things
Ad hoc networks
information dissemination
Human Factors
Geometry
Epidemics
Decision Making
critical information dissemination
coordinated decision-making
Computational modeling
combat efficiency
Biological system modeling
Battlefield
Analytical models
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »