Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
Insider Threat Detection with Face Recognition and KNN User Classification
Submitted by grigby1 on Thu, 04/08/2021 - 4:53pm
image authenticity
face recognition
authentication mechanism
Face
security concerns
Facial features
cloud insider
Cloud Penetration
cloud user community
Degree of Trust
factor authentication
nearest neighbour methods
kNN classification algorithm
KNN Classification and QoS
KNN user Classification
private cloud deployments
Security Method
threat detection model
Threat detection module
threat detection QoS
insider threat
policy-based governance
authorisation
Cloud Computing
information security
Insider Threat Detection
machine learning
Monitoring
Insider Threats
pubcrawl
Human behavior
security of data
resilience
Resiliency
message authentication
authentication
quality of service
cloud storage
pattern classification
sensitive information
Metrics
biblio
Adaptive Caching for Beneficial Content Distribution in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
in-network caching
utility-based replacement
request arrival rate
next-generation networking
network design
in-network caching mechanism
ICN interconnections
Future Internet (FI)
content-based providers
cache diversity
beneficial content distribution
beneficial caching scheme
adaptive caching mechanism
cache hit rate
content distribution
Information-Centric Networking (ICN)
IP networks
Information Centric Networks
information-centric networking
QoS
Proposals
quality of service
network topology
service providers
Economics
internet
pubcrawl
Resiliency
data traffic
security
telecommunication traffic
Scalability
biblio
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theory-based incentive mechanism
data plane
programmable network
Load management
software defined networking (SDN)
communication requirements
controller consortium blockchain
controller load balancing
cryptographic currency balance coin
game theoretic security
game-theoretic consensus
incentive controllers
incentive safe load balancing
load balance
multicontrollers
Pricing
proof-of-balance
secure load
resource allocation
Scalability
Cryptography
game theory
computer architecture
software defined networking
Resiliency
pubcrawl
blockchain
computer network security
Distributed databases
quality of service
Security analysis
Games
Human Factors
Predictive Metrics
SDN architecture
biblio
Adaptive Flow-Level Scheduling for the IoT MAC
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
Schedules
mobile computing
policy-based approach
Protocols
pubcrawl
QoS requirements
quality of service
resilience
Resiliency
Metrics
telecommunication scheduling
WiFi networks
Wireless communication
Wireless fidelity
wireless LAN
wireless MAC
wireless networks
high-density networks
adaptive flow-level scheduling
Admission control
best-effort scheduling
carrier sense multiple access
clean slate
collaboration
distributed CSMA
distributed MAC protocols
access protocols
high-speed mobile Internet access
Human behavior
Internet of Things
IoT communications
IoT MAC
IoT-M2M applications
machine-to-machine communication
biblio
Combined Approach to SSDF-Attacks Mitigation in Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
attacks malicious users
Cognitive Radio Security
SSDF-attacks mitigation
spectrum sensing data falsification attack
severe quality
service degradation
licensed users
licensed user
incorrect observations
fusion center
dynamic spectrum management
cooperative spectrum access
cognitive radio systems
telecommunication security
spectrum scarcity
cognitive radio networks
cognitive radio
radio spectrum management
signal detection
cooperative communication
radio networks
sensor fusion
quality of service
pubcrawl
Resiliency
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
A Review on Prevention and Detection Schemes for Black Hole Attacks in MANET
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
mobile ad hoc network
telecommunication security
telecommunication network topology
Scalability
Routing protocols
Routing
Resiliency
quality of service
pubcrawl
Performance Metrics
mobile ad hoc networks
manet attack prevention
MANET
delays
collaboration
changing topology
Black hole attacks
black hole attack prevention
black hole attack detection
Black hole attack
ad hoc network
biblio
Mitigation Technique for Black hole Attack in Mobile Ad hoc Network
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
mobile ad hoc networks
Random Mobility
network scenario
Gray hole attack
device communication
Black hole attacks
Black hole attack
mitigation technique
mobile ad hoc network
Throughput
Scalability
quality of service
delays
Routing protocols
Wireless communication
Routing
pubcrawl
Resiliency
telecommunication security
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 12:36pm
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »