Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fault tolerant systems
biblio
Fault Tolerance in a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
malicious transactions
Wireless communication
transaction-based applications
transaction serialization
transaction processing
transaction
serializability security
serializability
security of data
running transaction continuity
Resiliency
pubcrawl
Monitoring
Cloud Computing
intrusion tolerant scheme
intrusion tolerance
Fault tolerant systems
fault tolerant computing
fault tolerance
disk drives
Database systems
database management systems
database cloud
compromised system
composability
Cloud of databases environment
biblio
On Dependability, Cost and Security Trade-Off in Cloud Data Centers
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Fault tolerant systems
security of data
security
Resiliency
redundant resource usage
pubcrawl
priority of service requests
malicious fault
malicious attack
maintenance engineering
intrusion tolerance
Hardware
BFT
fault tolerance
dependability metric
dependability
data center
cost of service deployment
cost
computer centres
composability
cloud data centers
Cloud Computing
Byzantine Fault Tolerance
biblio
A Trust Management Based Framework for Fault-Tolerant Barrier Coverage in Sensor Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Resiliency
wireless sensor networks
wireless senor network
trust management-based framework
TrusDet
temporal sensory output correlation
telecommunication security
telecommunication network reliability
spatial sensory output correlation
sink-level decision
sensors
sensor-level detection
Robustness
collective voting
pubcrawl
intrusion tolerance
Intrusion Detection
HC-SR501 infrared sensor
Fuses
faulty sensor recognition
fault-tolerant intrusion detection algorithm
fault-tolerant barrier coverage
Fault tolerant systems
fault tolerance
Correlation
composability
biblio
Cost sensitive moving target consensus
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
IDS signal
TV
Switches
state machine replication
software fault tolerance
security of data
Resiliency
pubcrawl
Protocols
network vulnerability
moving target defense
moving target consensus
intrusion tolerance
intrusion detection system signal
Analytical models
fault-tolerant service
Fault tolerant systems
fault tolerance
crash fault tolerant protocol
crash fault tolerance
Consensus
Computer crashes
composability
CFT protocol
Byzantine fault tolerant protocol
Byzantine Fault Tolerance
BFT protocol
biblio
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
mean-time-to-security failure
VM-based intrusion tolerant systems
virtual machines
virtual machine
Transforms
sensitive information
Resiliency
pubcrawl
poisson arrivals
Poisson arrival process
ntrusion tolerance
Nickel
MTTSF
composability
mean time to security failure
M/G/1 queueing system
Laplace-Stieltjes transforms
Laplace-Stieltjes transform
intrusion tolerance
fault-tolerant scheme
Fault tolerant systems
fault tolerance
Computers
computer security
computer network security
biblio
A classification methodology for security patterns to help fix software weaknesses
Submitted by grigby1 on Mon, 11/20/2017 - 12:22pm
Policy
web applications
software weakness fixing
software weakness
software life
Software
security weaknesses
Security weakness
security principles hierarchical organization
security principles
security patterns
security of data
Resiliency
pubcrawl
policy-based governance
authentication
pattern classification
pattern choice
Metrics
internet
Human behavior
Government
Governance
Fault tolerant systems
fault tolerance
Databases
collaboration
classification semiautomatic methodology
classification
authorization
biblio
"IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles"
Submitted by grigby1 on Thu, 02/23/2017 - 2:27pm
fault tolerance
Very large scale integration
security
pubcrawl170106
nanotechnology
mechanical engineering computing
masquerade attack
IntelliCAN
Hardware Security
Fault tolerant systems
attack-resilient controller area network
error detection
Discrete Fourier transforms
controller area networks
controller area network(CAN)
computer network security
CAN protocols
automobiles
automobile
biblio
Formal Verification of Fault-Tolerant and Recovery Mechanisms for Safe Node Sequence Protocol
Submitted by BrandonB on Wed, 05/06/2015 - 2:39pm
machine
Tunneling magnetoresistance
SNSP
safe node sequence protocol
Redundancy
recovery mechanisms
real-time systems
Protocols
protocol state machine
model checking
event-triggered protocol
formal verification
fault-tolerant system
fault-tolerant prototype system
Fault-Tolerance
Fault tolerant systems
fault tolerance
fault model
fault classes
failure modes
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network
biblio
An advancing investigation on reduct and consistency for decision tables in Variable Precision Rough Set models
Submitted by BrandonB on Mon, 05/04/2015 - 2:28pm
Electronic mail
β-consistent notion
β-complement reduct
VPRS model
variable precision rough set model
rough set theory
pattern classification
Mathematical model
majority inclusion relation mechanism
hidden classification ability
Fault tolerant systems
fault tolerance
Analytical models
Educational institutions
decision tables
decision table structures
decision table splitting algorithm
data reduction
data integrity
Computational modeling
classical RS model
classical rough set theory
attribution reduction problem
« first
‹ previous
1
2
3
4
5
6
next ›
last »