Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by BrandonB on Fri, 05/01/2015 - 7:39am
power distribution reliability
utility servers
Topology
smart power grids
smart meters
Smart Grids
smart grid deployment
Smart Grid
simulation
Servers
routers
Reliability
qualitative assessment
power system security
power engineering computing
advanced metering infrastructure
grid topology
electrical distribution networks
DoS-DDoS attacks
DoS
distribution system reliability
distributed denial-of-service attacks
DDoS
cyber attack impact
cyber attack
critical smart grid infrastructures
computer network security
Computer crime
AMI
biblio
Survivable SCADA Via Intrusion-Tolerant Replication
Submitted by BrandonB on Thu, 04/30/2015 - 3:07pm
Protocols
Synchronization
survivable SCADA system
Survivability
Servers
security of data
SCADA systems
SCADA architecture
resilience
Reliability
Clocks
production engineering computing
performance degradation
Monitoring
Libraries
intrusion-tolerant replication
intrusion-tolerant protocols
fault tolerance
Cyber Attacks
cyber attack
biblio
Towards trustworthy complex event processing
Submitted by BrandonB on Thu, 04/30/2015 - 3:05pm
Fault tolerant systems
trustworthy
Trusted Computing
trust
threat analysis
Synchronization
soft realtime computing
Servers
Runtime
mission-critical applications
minimum runtime overhead
Intrusion Detection
intelligent computing
actionable situational knowledge
fault tolerance
event processing operations
Dependable Computing
Context
complex event processing
Byzantine Fault Tolerance
business intelligence
Business
Big Data
application semantics
algorithmic stock trading
biblio
Application-Aware Byzantine Fault Tolerance
Submitted by BrandonB on Thu, 04/30/2015 - 3:03pm
finite state machines
totally ordered request
System recovery
state-machine-based Byzantine fault tolerance algorithm
software fault tolerance
Servers
sequential execution
Semantics
security of data
request concurrent processing
replica nondeterminism
Message systems
Intrusion Resilience
Algorithm design and analysis
Fault tolerant systems
fault tolerance
deterministic application processing
dependability
Deferred Byzantine Agreement
concurrency control
computer system intrusion resilience enhancement
client-server systems
Byzantine agreement
application-aware Byzantine fault tolerance
application semantics
Application Nondeterminism
biblio
Application-Aware Byzantine Fault Tolerance
Submitted by BrandonB on Thu, 04/30/2015 - 3:02pm
finite state machines
totally ordered request
System recovery
state-machine-based Byzantine fault tolerance algorithm
software fault tolerance
Servers
sequential execution
Semantics
security of data
request concurrent processing
replica nondeterminism
Message systems
Intrusion Resilience
Algorithm design and analysis
Fault tolerant systems
fault tolerance
deterministic application processing
dependability
Deferred Byzantine Agreement
concurrency control
computer system intrusion resilience enhancement
client-server systems
Byzantine agreement
application-aware Byzantine fault tolerance
application semantics
Application Nondeterminism
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Submitted by BrandonB on Thu, 04/30/2015 - 2:37pm
bilinear pairings
Cloud Computing
Computational modeling
distributed computing
Distributed databases
identity-based cryptography
Indexes
Protocols
provable data possession
security
Servers
biblio
A New Efficient and Secure POR Scheme Based on Network Coding
Submitted by BrandonB on Thu, 04/30/2015 - 2:35pm
dispersal code
Silicon
Servers
security of data
secure POR scheme
proof of retrievability
network coding-based POR
network coding
maintenance engineering
maintenance
local data storage
encoding
efficient POR scheme
Availability
Decoding
Data Security
data integrity
data confidentiality
data communication
data checking
data availability
cost reduction
corruption attack prevention
corruption attack
Cloud Computing
biblio
A novel architecture for identity management system using virtual appliance technology
Submitted by BrandonB on Thu, 04/30/2015 - 2:25pm
identity management systems
Virtualization
Virtual machining
virtual machines
virtual machine monitor platform
virtual appliance technology
virtual appliance
third party cloud
Servers
security of data
information security
computer architecture
Identity management system architecture
identity management system
Identity management
Home appliances
Hardware
green computing practices
green computing
enterprise based application
cost benefit
biblio
HVSTO: Efficient privacy preserving hybrid storage in cloud data center
Submitted by BrandonB on Thu, 04/30/2015 - 2:12pm
privacy preserving hybrid storage
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine storage
solid state disk
service infrastructure
Servers
security
privacy preserving shared storage system
Cloud Computing
large-scale cloud data center
Indexes
I/O latency performance improvement
hybrid VM storage
HVSTO
distributed structure
distributed storage
data privacy
Conferences
computer centres
« first
‹ previous
…
86
87
88
89
90
91
92
93
94
next ›
last »