Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Trust-Based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
policy-based network administration
usability
trust-based performance evaluation
telecommunication security
Routing protocols
routing protocol design
Resiliency
resilience
quality of service (QoS)
quality of service
QoS
pubcrawl
psychology
Pragmatics
ART
Mobile handsets
mobile circumstantial network
mobile ad hoc networks
Metrics
MANET security
MANET
Loading
Learning management systems
key administration
IPsec
Internet Protocol Security (IPsec)
Cryptographic Protocols
Compositionality
biblio
Hybrid Approach for Congestion Control in VANETs
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Compositionality
Congestion Control
MANET
MANET security
Metrics
pubcrawl
quality of service
resilience
Resiliency
Safety messages
VANETs
biblio
A Multi-layered Outlier Detection Model for Resource Constraint Hierarchical MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
MANET Attack Detection
security dimensions
resource constraint hierarchical MANET
Resiliency
quality-of-service parameters
quality of service
QoS
pubcrawl
Outliers
outlier minimum improvements
novel multilayered outlier detection algorithm
network performance
multilayered outlier detection model
mobile ad hoc networks
Metrics
ad hoc communication MANET
layered architecture
inliers
high security level
hierarchical similarity metric
hierarchical categorized data
fixed infrastructure
Dynamic Network
distributed network
density-based clustering
decentralized network
Data collection
data analysis
composability
Attack detection
biblio
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
Submitted by grigby1 on Fri, 04/05/2019 - 10:29am
Scalability
pubcrawl
QoS
QoS as a service paradigm
quality of service
Relays
reputation
resilience
Resiliency
probabilistic fake VIP attack strategy
Servers
signature detection cost
Stackelberg game
Stackelberg game setting
trust
trust strategy
two-dimensional Markov chains
best-response fake VIP attack strategy
Markov processes
intelligent fake VIP attacks
handwriting recognition
Games
game theory
Fake VIP attack
double-blind reputation scheme
digital signatures
demanded QoS level
demand undue QoS level
cloud-assisted interactions
Cloud Computing
client-server systems
client-server interactions
Chained Attacks
biblio
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
SDN self-healing mechanisms
fault tolerance
Immune system
multiobjective optimization framework
network orchestration
networking paradigm
quality of service
Run Time
SDN controller
end-to-end packet delay
security cost
security countermeasures
self-healing cyber resilient framework
software defined networking-enabled energy delivery system
Sorting
system resilience
Virtualization
self-healing networks
Cyber Attacks
computer network security
authorisation
computer network management
software defined networking
pubcrawl
composability
optimisation
authentication
cyberattack
resilience
access control rules
automated network management
autonomous attack containment
computational complexity
configurable trust levels
delays
biblio
Service Oriented Resilience Strategy for Cloud Data Center
Submitted by grigby1 on Fri, 03/22/2019 - 1:01pm
Measurement
system resilience
Stochastic processes
service oriented resilience
Servers
Scalability
Resilience strategy
resilience metric
resilience
quality of service
pubcrawl
Petri nets
Metrics
Resilient Security Architectures
maintenance engineering
IT architecture
hierarchical colored generalized stochastic petri net
fault tolerance
data centers
computer networks
computer centres
cloud data center
Cloud Computing
big data security
Big Data
Resiliency
biblio
Analytics as a service architecture for cloud-based CDN: Case of video popularity prediction
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
CDN logs
video popularity prediction
user generated videos
scattered caches
RESTful Web services
quality of service
prediction services
NoSQL databases
NoSQL database
k-means clustering prediction model
highly variable UGV popularity
end-user content delivery network requests
end-user behaviour
dynamic model training
cloud-based CDN
Cloud Computing
analytics as a service architecture
pattern clustering
web services
Web Caching
cache storage
computer architecture
Training
Streaming media
Scalability
Resiliency
Metrics
pubcrawl
Analytical models
Predictive models
biblio
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment
Submitted by grigby1 on Fri, 10/26/2018 - 5:05pm
Games
undesirable CSPs
security risk levels
security risk avoidance
security risk assessment
security of data
security
Scalability
risk management
quality of service
pubcrawl
online Cloud federation formation
Metrics
insecure CSPs
Human Factors
hedonic coalitional game
Cloud Computing
game theory
game theoretic security
federation formation algorithm
federated Cloud service
cooperative game
Computational modeling
coalitional game
cloud service providers
Cloud Security
Cloud federations
Cloud federation formation process
Cloud federation formation model
cloud federation
cloud environments
biblio
Deep packet inspection Management application in SDN
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
resilience
JSON-Java Script Object Notation
nonrelational data base
north-bound application
Open vSwitch-Open Virtual Switch
pubcrawl
QoS-Quality of Service
quality of service
real-time systems
JSON format
Resiliency
Scalability
SDN architecture
SDN-Software Defined Networking
SNMP trap notifications
software defined networking
Switches
application signature data analysis
Inspection
flow provisioning behavior
Engines
DPI-Deep Packet Inspection
DPI management application
digital signatures
deep packet inspection management
deep packet inspection
Databases
data representation
data flows
data analytic engine
data analysis
computer network security
application threshold
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »