Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
biblio
A Formal Modeling and Verification Framework for Service Oriented Intelligent Production Line Design
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
service-oriented architecture
performance constraints
production engineering computing
pubcrawl
quality of service
resilience
Resiliency
service oriented
service oriented intelligent production line design
model-centric way
simulations
Software Architecture
Task Analysis
tools
Unified modeling language
verification method
web services
formal verification
application requirements
complex application
composability
CPS modeling
existing modeling methods
formal modeling
formal simulation verification framework
Formal Specification
Adaptation models
independent equipment network integration
Intelligent production line
large scale high-performance system
Mathematical model
Metrics
model and verification
model-based service-oriented integration approach
biblio
Multi-beam Physical Security Scheme: Security Assessment and Impact of Array Impairments on Security and Quality of Service
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
radio transmitters
multilevel constellation
multiple-input multiple-output
perfect channel state information
Phase shift keying
power amplification
pubcrawl
quality of service
quasiconstant envelope signals
multibeam physical security scheme
Receivers
security assessment
signal components
Springs
telecommunication security
transmitting antennas
wireless channels
cyber physical systems
antenna arrays
array impairments
array power gain increments
array signal processing
channel level
component signal
Compositionality
CSI
amplification branch
decomposition
envelope variations
fact constrains
high order constellation signals
Metrics
MIMO communication
mMIMO
biblio
Multipath Traffic Engineering for Software Defined Networking
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IP networks
telecommunication traffic
Streaming media
software defined networking
service quality criteria
Scalability
Resiliency
resilience
quality of service
pubcrawl
Protocols
packet communication
network bandwidths
multipath traffic engineering
multimedia market
IPS
application-aware mechanism
Internet video sharing
internet
Inspection
IDS
Firewalls (computing)
firewall
dpi
deep packet inspection
control systems
communication bottlenecks
Broadcasting
broadcast television
bandwidth restrictions
ASA systems
biblio
A Study on Service Identification Based on Server Name Indication Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
pubcrawl
Transport Layer Security
TLS/SSL
telecommunication traffic
Service Name Indication (SNI)
service identification method
Service Identification
Server Name Indication analysis
security issues
Scalability
Resiliency
resilience
quality of service
computer network security
port numbers
IP networks
IP network flows
IP addresses
identification accuracy
dpi
Deeply Programmable Network (DPN)
Deep Packet Inspection (DPI)
deep packet inspection
current IP flows
Cryptography
biblio
A Review on Internet of Things Protocol and Service Oriented Middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
middleware security
wireless sensor networks
SOA based IoT middleware
service-oriented architecture
service oriented middleware
service oriented architecture
security
Resiliency
resilience
quality of service
pubcrawl
Protocols
policy-based governance
applications development
middleware
machine-to-machine communications
IoT Protocols and IoT Security
IoT middleware
IoT dependent
interoperability
Internet of Things protocol
Internet of Things
health care
divorce application
desirable protocol
composability
biblio
Smart Transportation Delay and Resiliency Testbed Based on Information Flow of Things Middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
policy-based governance
Transportation
time-sensitive distributed smart transportation systems
telecommunication traffic
Task Analysis
smart transportation delay
sensors
security of data
security
routing service
resiliency testbed
Resiliency
resilience
real-time data-driven applications
quality of service
pubcrawl
Anomaly Detection
middleware security
middleware
IoT devices
Internet of Things
information flow of things middleware
fog computing paradigms
edge computing paradigms
distributed processing platform
distributed computing
delays
decentralized traffic speed query
decentralized anomaly detection approach
composability
Cloud Computing
Big Data
biblio
A QoS-Aware Cache Replacement Policy for Vehicular Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 3:54pm
delays
Human behavior
Liquid crystal displays
Named Data Network Security
pubcrawl
quality of service
resilience
Resiliency
Scalability
security
Streaming media
vehicle dynamics
vehicular ad hoc networks
biblio
Analysis of Malicious Behavior of Blackhole and Rushing Attack in MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
NS-2
wireless links
telecommunication security
telecommunication network routing
security attacks
security
rushing attack
Rushing
Resiliency
quality of service
QoS metrics
pubcrawl
AODV
network nodes
Mobile adhoc Network
mobile ad hoc networks
Metrics
MANET security
MANET
malicious behavior
Compositionality
Blackhole attack
Blackhole
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »