Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone
Submitted by grigby1 on Thu, 10/13/2022 - 12:16pm
security
Monitoring
Servers
pubcrawl
Human behavior
DNS
Phishing
unsolicited e-mail
Electronic mail
Uniform resource locators
overload mitigation
phishing URL
Response Policy Zone
route detouring
RPZ
URL Phishing attack
biblio
Privacy-Preserving Proximity Detection Framework for Location-Based Services
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
sensors
private proximity detecting
location based services(LBSs)
Location Privacy in Wireless Networks
location privacy
privacy preserving
Homomorphic encryption
Mobile communication
Performance analysis
wireless networks
Compositionality
Servers
composability
Wireless communication
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Performance Impact of Host Kernel Page Table Isolation on Virtualized Servers
Submitted by grigby1 on Thu, 09/29/2022 - 4:45pm
Servers
pubcrawl
Hardware
performance evaluation
Scalability
Benchmark testing
Registers
Linux
Virtual machining
Virtualization
i-o systems security
Performance
Linux kernel
ARMv8
KPTI
x86
biblio
Deep Learning Based Event Correlation Analysis in Information Systems
Submitted by grigby1 on Thu, 09/29/2022 - 4:44pm
Computational modeling
event log
attention mechanism
GRU
RNN
Neural networks
i-o systems security
LSTM
computer science
deep learning
Scalability
Correlation
Software
pubcrawl
Servers
cyber security
Predictive models
biblio
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis
Submitted by grigby1 on Tue, 09/20/2022 - 2:01pm
computer architecture
Servers
pubcrawl
Metrics
Hardware
Hardware Security
Runtime
Measurement
security risk assessment
statistical analysis
Security Metrics
graph theory
Computing Theory
hardware security metrics
biblio
An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
Fuzzy Cryptography
authentication
Cloud Computing
Costs
Fog computing
key management
Mobile handsets
ProVerif
pubcrawl
resilience
Resiliency
Resists
Scalability
security
security issues
Servers
biblio
Decoy VNF for Enhanced Security in Fog Computing
Submitted by grigby1 on Fri, 09/16/2022 - 4:38pm
deep learning
security
Servers
pubcrawl
resilience
Scalability
telecommunication traffic
Fog computing
real-time systems
malware
Resiliency
Malware interception
operating system kernel
biblio
Comprehensive Study of Moving from Grid and Cloud Computing Through Fog and Edge Computing towards Dew Computing
Submitted by grigby1 on Fri, 09/16/2022 - 4:38pm
computer architecture
Cloud Computing
security
Servers
Peer-to-peer computing
pubcrawl
resilience
Scalability
information and communication technology
Wireless communication
Fog computing
edge computing
Resiliency
Dew Computing.
Gird Computing
biblio
Convergence of Cloud and Fog Computing for Security Enhancement
Submitted by grigby1 on Fri, 09/16/2022 - 4:37pm
Fog computing
Security monitoring framework
cloud server
virtual machine
Costs
Resiliency
computing resources
cyber-attack
Virtual machining
encryption
edge computing
Scalability
resilience
pubcrawl
Servers
Monitoring
security
Cloud Computing
biblio
CLOUDITY: Cloud Supply Chain Framework Design based on JUGO and Blockchain
Submitted by grigby1 on Fri, 09/09/2022 - 3:34pm
Cloud Computing
Servers
blockchain
pubcrawl
resilience
Resiliency
Databases
Companies
smart contracts
supply chains
supply chain management
supply chain security
Cloud as a Service
Cloudity
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »