Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:11am
internet
Topology
Sybil placement strategy statistical assessment
Stochastic processes
Stochastic Process
statistical analysis
Routing
peer-to-peer distributed hash tables
Peer-to-peer computing
packet level network simulation
network topology
invasive software
botnet command and control solution
interdefender coordination
diffused random graph
DHT-structured peer-to-peer botnets
DHT-structured P2P botnets
cyber security threat
Computers
computer network security
Computational modeling
compromised computer on-demand collections
command and control systems
C&C solutions
biblio
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Submitted by BrandonB on Wed, 05/06/2015 - 9:13am
content-centric networking architecture
unicast delivery
Unicast
Topology
semi-stateless forwarding scheme
Probabilistic logic
Ports (Computers)
ISP topologies
data structures
adaptive forwarding
Conferences
Computers
computer networks
computer architecture
CCN architecture
Bloom filter-based stateless forwarding
Bandwidth
biblio
Detecting, locating, amp; quantifying false data injections utilizing grid topology through optimized D-FACTS device placement
Submitted by BrandonB on Tue, 05/05/2015 - 12:32pm
power grids
Voltage control
Vectors
Transmission line measurements
topology perturbation
Topology
state estimation
situational awareness method
power system state estimation
power system security
AC state estimation
Perturbation methods
optimized D-FACTS device placement
Jacobian matrices
grid topology
flexible AC transmission systems
false data injection attack vector
Distributed Flexible AC Transmission Systems
distributed flexible AC transmission system devices
bad data detection scheme
biblio
Using Set-Based Heading to Improve Mobile Agent Movement
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
network theory (graphs)
Topology
Time measurement
situational security
situational awareness
set-based heading
security of data
security
scale-free graph
random walk
random processes
nonheading movement technique
cover time
network (graph)
movement method
mobile agents
mobile agent movement
minimum distance graph
History
heading
Geography
foraging application
Electronic mail
dynamic graph topology
biblio
Models and tools for the high-level simulation of a name-based interdomain routing architecture
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
packet-level models
Topology
telecommunication traffic
telecommunication network topology
telecommunication network routing
sensitivity analysis
Routing
reusable traffic model
reusable topology model
reusable deployment model
Peer-to-peer computing
aggregate models
network topology
modular design
internet
high-level simulation methodology
global network architecture operation
global network architecture deployment
complex-dynamic behavior
clean slate name-based interdomain routing architecture
Approximation methods
Aggregates
biblio
Dependability and Resource Optimation Analysis for Smart Grid Communication Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
stochastic petri nets
resource allocation
resource resource optimization analysis
Smart Grid
smart grid communication network reliability
smart grid security
Smart Grids
smart power grids
SPN
stochastic Petri net
reliability importance
stochastic programming
telecommunication network reliability
telecommunication security
Topology
two-way interactive communication
underlie communication network
wireless mesh network
wireless mesh network technology
wireless mesh networks
network management
computer architecture
cyber-attack risk
dependability analysis
dependability modeling
intelligent resource management
Logic gates
Markov processes
mean time to failure
MTTF
Availability
next generation power distribution
Petri nets
power distribution reliability
power system security
RBD
Redundancy
redundancy mechanism
reliability block diagrams
biblio
Multi-agent systems applied to topological reconfiguration of smart power distribution systems
Submitted by BrandonB on Tue, 05/05/2015 - 9:14am
power distribution control
voltage regulation
topology reconfiguration
Topology
Substations
smart power grids
smart power distribution systems
Smart Grids
Smart Grid
power loss reduction
power loss minimization
11-Bus system
power distribution
multiagent systems
multi-agent systems
Minimization
load balancing
electrical vehicles
Decision Making
control action adaptive response
alternative generation sources
16-Bus system
biblio
Dissecting On-Node Memory Access Performance: A Semantic Approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:42pm
memory behaviour
Topology
storage management
Semantics
semantic approach
sampling-based performance measurement units
sampled memory accesses
Program processors
power efficiency
PMU
performance ramifications
on-node memory access performance
multithreading
multi-threading
attribute semantic information
memory access optimization
Libraries
Kernel
Hardware
fine-grained memory access performance data
domain decomposition
distributed memory systems
design decisions
data objects
data motion
CPU manufacturers
Context
code regions
biblio
Security configuration analytics using video games
Submitted by BrandonB on Mon, 05/04/2015 - 2:26pm
security of data
NetMaze
network configuration verification problem
network topology
provable mapping
provable verification
security
Security analysis
security configuration analytics
security configuration settings
Human Factors
security property
simulation tool
special languages
specification languages
system robustness
Topology
user interfaces
video games
Vulnerability
crowdsourcing
attack analysis
attack attribution
Communication networks
Computational modeling
computer games
computing systems
Conferences
configuration conflict
courseware
3D game object
educational software
formal methods
formal verification
game educational value
game interface
gameplay scenario
Games
human factor
biblio
Montage: Combine frames with movement continuity for realtime multi-user tracking
Submitted by BrandonB on Mon, 05/04/2015 - 11:59am
smart phones
Vectors
user movement vector estimation
tracking
Topology
temporal constraints
target tracking
submeter-level tracking
spatial constraints
Smartphones
Acceleration
real-time multiuser formation tracking
moving-direction estimation
movement continuity
mobile phones
meter-second-level formation tracking accuracy
Earth
Distance measurement
Acoustics
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »