Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation
Submitted by grigby1 on Wed, 01/10/2018 - 12:21pm
packet error rate formula
wireless service confidentiality
Wireless communication
telecommunication security
security performance
security
Resiliency
Receivers
Rayleigh fading channel
Rayleigh channels
quality of service
pubcrawl
physical-MAC layer security design
PER formula
adaptive modulation
MRC
modulation
Measurement
maximal ratio combination
fading channels
diversity reception
Decoding
cross MAC-PHY layer security design
Cross Layer Security
composability
Automatic repeat request
ARQ
biblio
Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
QoS
VM-based intrusion tolerant systems
Virtualization
virtual machines
virtual machine
Time factors
security of data
security
Resiliency
queueing theory
quality of service
composability
pubcrawl
MTTSF
mean time to security failure
Markov processes
Markov model
intrusion tolerance
Electronic mail
Computers
Computational modeling
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
web services
Software Architecture
SOA services
SOA
service-oriented architecture
service performance policies
service interactions
service guarantees
security policy
Security Policies Analysis
security policies
security of data
real-world service composition scenario
quality of service
authorisation
Privacy Policies
policy-based governance
policy enforcement monitoring
Monitoring
interaction authorization policies
end-to-end service invocation chain
end-to-end security
data privacy
collaboration
cloud-based service orchestrations
cloud services
Cloud Computing
Biomedical monitoring
authorization
biblio
Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security
Submitted by grigby1 on Mon, 11/20/2017 - 12:19pm
security
Policy
policy-based governance
pubcrawl
QCQP
QoS constraints
quadratically constrained quadratic problem
quality of service
quality-of-service constraints
Resiliency
SCIP algorithm
physical layer security
sensor nodes
solving constraint integer programs
telecommunication security
total energy consumption
transmitting antennas
virtual MIMO-based cooperative beamforming and jamming
virtual multiinput multioutput communication architecture
Wireless Sensor Network
wireless sensor networks
WSN
cooperative communication
array signal processing
artificial neural network
Artificial Neural Networks
artificial noise
beamforming
beamforming vector optimization
cluster-based cooperative wireless sensor networks
clustered wireless sensor network security
collaboration
computational complexity
antenna
energy consumption
Governance
Government
integer programming
Jamming
jamming vector optimization
MIMO
MIMO communication
MISO
NP-hard problem
biblio
Quality of information-aware real-time traffic flow analysis and reporting
Submitted by grigby1 on Wed, 03/08/2017 - 2:06pm
pubcrawl170111
video signal processing
vehicles
vehicle count
traffic video analysis
traffic metrics
traffic information systems
Streaming media
sensors
quality of service
quality of information-aware networking
QoI
Accuracy
mobile device
mobile computing
information-aware real-time traffic flow analysis
Image edge detection
form responses
end devices
desktop workstation
Cameras
bandwidth savings
average speed
biblio
Query of Uncertain QoS of Web Service
Submitted by grigby1 on Wed, 03/08/2017 - 1:53pm
Computers
continuous probability distribution
internet
optimization approaches
Probability distribution
pubcrawl170110
Q measurement
QoS
quality of service
query processing
Semantics
uncertain QoS query
uncertainty
Web Service
web services
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
biblio
"An integrated signaling-encryption mechanism to reduce error propagation in wireless communications: performance analyses"
Submitted by grigby1 on Mon, 02/13/2017 - 2:19pm
signaling encryption mechanism
Monte Carlo simulations
pubcrawl170102
quality of service
quality of service (QoS)
radio networks
Rayleigh channels
Rayleigh fading
Rayleigh fading-type channels
reduce error propagation
integrated signaling encryption mechanism
telecommunication security
Throughput
time delay processing
transmission data rate
wireless channel interference
wireless channels
Wireless communication
Wireless communications
encryption
advanced encryption standard (AES)
AES
Bit error rate
bit-error probability
bit-error rate
bit-error rate performance
convolutional error correction coding
Cryptography
encoding
advanced encryption standard
encryption techniques
error correction codes
error correction coding
error statistics
fading channels
Gaussian fading-type channels
Hamming coding
incorporate error correction
biblio
Modeling Network Medium Access Protocols for Network Quality of Service Analysis
Submitted by Katie Dey on Thu, 11/12/2015 - 1:58pm
Resilient Systems
Science of Security
Foundations
network time-varying performance
Access
analysis
Analytical models
Bandwidth
Calculus
Data models
delays
design-time analysis
distributed real-time embedded system verification
embedded systems
foundations
Medium
Network
network medium channel access protocol
network quality of service analysis
verification
protocol
Protocols
QoS
quality
quality of service
Resilient Monitoring and Control
Resilient Systems
Satellites
Science of Security
Service
SURE Project
TDMA
time division multiple access
time-varying channels
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »