Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Topology
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
massive topology degradation
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
equipment failure
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
network topology
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
pubcrawl
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 1:53pm
power information
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
coupling model
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
computer network reliability
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
Bayes methods
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
biblio
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
Internet-of-Battlefield Things security
Topology
Scalability
Sawtooth
pubcrawl
Protocols
permissioned blockchain
network topology
network configuration
mission oriented tasks
military technology
military computing
IoBT environment
iobt
Internet-of-Things solutions
Ad hoc networks
Internet of Things
Human Factors
ergonomics
distributed ledger
Distributed databases
data communication
Cybersecurity
Cryptography
centralized communication technology
blockchain-integrated IoBT platform
blockchain usability
blockchain
Bandwidth
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
intellectual property/IC
IP piracy
SAT attack
hardware obfuscation
Anti-Trojan insertion algorithm
Controllability
copy protection
design-for-trust
hardware Trojan insertion
HT insertion
hardware trojan
logic encryption methods
logic encryption techniques
logic locking
PUF based logic encryption technique
PUF-based encryption
Rare Signal
reverse engineering attack
unique encryption
Hardware Security
encryption
Hardware
invasive software
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
integrated circuits
Cryptography
Topology
Logic gates
industrial property
reverse engineering
integrated circuit design
logic circuits
Physical Unclonable Function
encryption key
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
research target
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
modern computing
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
Cyber-physical attacks
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
advanced communication technologies
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
OFMTL-SEC: State-based Security for Software Defined Networks
Submitted by aekwall on Mon, 10/05/2020 - 11:54am
Switches
Dynamic Networks and Security
stateful security data plane solution
stateful data-plane protection designs
state-based SDN security protection mechanisms
OFMTL-SEC
NFV technologies
network function virtualization technologies
dynamic network security services
configuration-based attacks
ARP Spoofing
address resolution protocol
computer network security
Topology
Metrics
Protocols
composability
pubcrawl
Resiliency
software defined networking
security
virtualisation
network function virtualization
biblio
Formal Modeling and Security Analysis for OpenFlow-Based Networks
Submitted by aekwall on Mon, 10/05/2020 - 11:53am
Semantics
Dynamic Networks and Security
topology-oriented operational semantics
point-to-point topology
Operational Semantics
openflow-based networks
formal OpenFlow-based network programming language
dynamic OpenFlow applications
dynamic flow rules
Switches
computer network security
Topology
Security analysis
network topology
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Context-Aware Privacy Preservation in a Hierarchical Fog Computing System
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
quality of service
Computing Theory and Privacy
multiple fog node communication
hierarchical infrastructure
hierarchical fog computing system
FOG computing environment
dynamic MDP-based privacy-preserving model
decentralized infrastructure
context-aware privacy preservation
content-aware applications
zero-sum game
Ethernet
Privacy Threats
Topology
security of data
Redundancy
network topology
pubcrawl
Human behavior
Resiliency
real-time systems
game theory
Protocols
distributed processing
Internet of Things
data privacy
Scalability
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »