Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
On the Role of Fitness Dimensions in API Design Assessment - An Empirical Investigation
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
Conferences
usability
testing
Stakeholders
security
Resiliency
resilience
pubcrawl
fitness dimensions
design considerations
API assessment
Compositionality
Companies
application programming interfaces
application program interfaces
APIs
API ecosystem
API design assessment
API design
biblio
Web Caching Evaluation from Wikipedia Request Statistics
Submitted by grigby1 on Mon, 03/26/2018 - 12:54pm
Servers
Zipf distributed requests
wireless networks
Wikipedia request statistics
Wikipedia pages
Wikipedia daily top-1000 statistics
Wikipedia caches
Web sites
web caching strategies
Web caching evaluation
Web Caching
statistical analysis
simulation
access time reduction
Scalability
Resiliency
resilience
pubcrawl
Metrics
internet
hit rate
Encyclopedias
Electronic publishing
Conferences
cache storage
biblio
APT Attack Behavior Pattern Mining Using the FP-Growth Algorithm
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
host PC security technologies
signature-based intrusion detection systems
Scalability
Resiliency
resilience
pubcrawl
PE files
Pattern Mining
pattern matching
Metrics
malware
Intrusion Detection
Human behavior
advanced persistent threat attacks
FP-growth algorithm
firewalls
digital signatures
Data mining
Conferences
Cancer
APT attack behavior pattern mining
APT attack
application program interfaces
API files
advanced persistent threats
biblio
Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game against Advanced Persistent Threats
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Resiliency
framing effect
game theory
Games
Human behavior
Metrics
Nash equilibria
probability
probability weighting effect
pubcrawl
resilience
expected utility theory
Scalability
scan interval
security of data
storage devices
storage management
subjective attacker
targeted attacks
uncertain attack durations
utility theory
computer security
privacy
advanced persistent threat
advanced persistent threats
APT attacker
APT defense game
attack interval
Cloud Computing
cloud storage
cloud storage defense game
Computing Theory
Conferences
CPT
cumulative decision weights
cumulative prospect theoretic study
cumulative prospect theory
data privacy
Decision Making
discrete decision weights
distortion
biblio
Enhancing SDN Security for IoT-Related Deployments through Blockchain
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
resilience
IoT
IoT clouds
IoT-related deployments
jurisdictional boundaries
Metrics
national boundaries
network reconfiguration
networking paradigm
policy enforcement
pubcrawl
recently introduced Blockchain paradigm
render Blockchain
Internet-of-Things-related networking elements
Resiliency
safety-critical applications
SDN
SDN security
security
significant security factor
software defined networking
Switches
thorny issue
traditional networking deployments
Virtualization
cross national boundaries
blockchain security
Business
business activity
cloud
Cloud Computing
cloud computing infrastructure
composability
computer network security
Conferences
connected nodes
connected world
blockchain
dynamic manner
dynamic networks
efficient entity interconnection
efficient monitoring
emerging networking paradigm
geographic boundaries
increased attack surface
integrated world
intercloud communication
internet
Internet of Things
biblio
Enhancing SDN Security for IoT-Related Deployments through Blockchain
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
resilience
IoT
IoT clouds
IoT-related deployments
jurisdictional boundaries
Metrics
national boundaries
network reconfiguration
networking paradigm
policy enforcement
pubcrawl
recently introduced Blockchain paradigm
render Blockchain
Internet-of-Things-related networking elements
Resiliency
safety-critical applications
SDN
SDN security
security
significant security factor
software defined networking
Switches
thorny issue
traditional networking deployments
Virtualization
cross national boundaries
blockchain security
Business
business activity
cloud
Cloud Computing
cloud computing infrastructure
composability
computer network security
Conferences
connected nodes
connected world
blockchain
dynamic manner
dynamic networks
efficient entity interconnection
efficient monitoring
emerging networking paradigm
geographic boundaries
increased attack surface
integrated world
intercloud communication
internet
Internet of Things
biblio
A Layered Graphical Model for Mission Attack Impact Analysis
Submitted by grigby1 on Tue, 02/27/2018 - 2:36pm
Human behavior
unanticipated cyber activities
sockets
Scalability
Resiliency
resilience
pubcrawl
NIST National Vulnerability Database
mission attack impact analysis
military missions
Metrics
Legged locomotion
layered graphical model
Human Factors
attack activities
graph theory
graph levels
Forensics
forensic investigators
Digital Forensics
Cyber Dependencies
Conferences
Computational modeling
Compositionality
Common Vulnerability Scoring System
business missions
business data processing
attack logs
biblio
Application of Deep Learning Technique for Automatic Data Exchange with Air-Gapped Systems and Its Security Concerns
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
DHT11 sensor
security
Resiliency
resilience
pubcrawl
Metrics
Internet of Things
Humidity
Human Factors
Human behavior
Air gaps
DH-HEMTs
deep learning
data exchange
Conferences
computer security
composability
Arduino board
Air-Gapped Systems
biblio
One more queue is enough: Minimizing flow completion time with explicit priority notification
Submitted by grigby1 on Wed, 02/21/2018 - 1:49pm
Resiliency
packet switching
policy governance
Policy-Governed Secure Collaboration
Processor scheduling
pubcrawl
queue
queueing theory
resilience
Metrics
scheduling
scheduling mechanism
switch priority queues
Switches
TCP
telecommunication traffic
transport protocols
fine-grained priorities
clean slate
clean-slate switch hardware
collaboration
commodity switches
computer centres
Conferences
Dynamic scheduling
EPN
Bandwidth
flow completion time
flow scheduling
flow size information
Hardware
Human behavior
human factor
Human Factors
biblio
Implementation and optimization of A5-1 algorithm on coarse-grained reconfigurable cryptographic logic array
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
resource allocation
Microelectronic Security
Noise measurement
performance optimization
pubcrawl
real-time requirements
reconfigurable architectures
resilience
Resiliency
Metrics
resource consumption
resource-based path seeking algorithm
RPS adaptive algorithm
shift registers
stream cipher
telecommunication security
Throughput
voice data encryption
coarse-grained reconfigurable cryptographic logic array
A5-1 algorithm optimization
Algorithm design and analysis
application specific integrated circuits
ASIC
bit rate 162.87 Mbit/s
cellular radio
CGRCA
Ciphers
A5-1
composability
Conferences
Cryptography
field programmable gate arrays
FPGA
frequency 162.87 MHz
GSM
« first
‹ previous
…
71
72
73
74
75
76
77
78
79
…
next ›
last »