Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion tolerance
biblio
Improving the Security of Microservice Systems by Detecting and Tolerating Intrusions
Submitted by aekwall on Wed, 08/11/2021 - 2:29pm
security
Monitoring
computer architecture
Intrusion Detection
Containers
Scalability
pubcrawl
Resiliency
composability
Current measurement
intrusion tolerance
microservices
biblio
A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection
Submitted by aekwall on Wed, 08/11/2021 - 2:29pm
computer architecture
Intrusion Detection
computer networks
pubcrawl
Resiliency
composability
computer security
Systematics
attacks
Bibliographies
cyberphysical system
IDS architectures
malware
multi-agent
review
intrusion tolerance
biblio
A Moving Target Defense Technology Based on SCIT
Submitted by grigby1 on Mon, 08/02/2021 - 3:07pm
network security
Switches
Software stack diversity
Software
Servers
security
Scalability
Random switching
pubcrawl
intrusion tolerance
moving target defense
Metrics
Complexity theory
Communication networks
cleaning
composability
Resiliency
biblio
Security Chaos Engineering for Cloud Services: Work In Progress
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cloud computing security
traditional security paradigms
security chaos engineering
Resilient Architectures
nonsecurity failures
Human Errors
CloudStrike
Cloud-Security
cloud security system
intrusion tolerance
security models
security risk assessment
cloud infrastructure
Intrusion Detection
chaos
software fault tolerance
Fault tolerant systems
cloud services
security breaches
fault tolerance
testing
composability
pubcrawl
Resiliency
Cloud Computing
security of data
biblio
A Progressive Intrusion Detection System through Event Processing: Challenges and Motivation
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
computer science
system attacks
progressive intrusion detection system
IDS systems
Host and Network IDS
false negative rates
Events Clustering and Aggregation.
event processing
dynamic attacks
Complex Event Processing (CEP)
complex event processing
CEP
intrusion tolerance
security of data
Firewalls (computing)
security threats
Intrusion Detection System (IDS)
Intrusion Detection
Training
internet
composability
pubcrawl
Resiliency
real-time systems
Organizations
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
Enhancing the Reliability of NFV with Heterogeneous Backup
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
NFV
VNF executor
virtual network function
Service Chain
scalable end-to-end service chaining
NFV SFC
heterogeneous backup strategy
Heterogeneous
flexible end-to-end service chaining
data center environments
Backup
back-up procedures
intrusion tolerance
network function virtualization
Switches
security of data
computer centres
Virtualization
Games
Load modeling
game theory analysis
Reliability
composability
pubcrawl
Resiliency
game theory
Software
security
virtualisation
Cloud Computing
biblio
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
malicious fault-tolerant systems
intrusion tolerance
automotive cybersecurity
brand degradation
cars
electronic features
highly available systems
integrity verification
malicious fault-tolerance
fraud
road-side equipment
self-defending techniques
self-defending technologies
self-healing systems
self-repair
single protection technique
system-level integrity
warranty fraud
composability
road safety
Safety
security of data
traffic engineering computing
Monitoring
Cloud Computing
Resiliency
pubcrawl
Automotive engineering
smart phones
computer security
fault tolerance
Smartphones
Fault tolerant systems
software fault tolerance
malicious attacks
automobiles
biblio
Survey on Fault Tolerance and Security in Mobile Ad Hoc Networks (MANETs)
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
Ad hoc networks
unipath routing
unipath protocols
multipath protocols
MBID
IDS for Mobile Ad hoc Networks
cooperative security
ABID
intrusion tolerance
network topology
Fault tolerant systems
mobile computing
telecommunication security
telecommunication network topology
mobile ad hoc networks
MANET
fault tolerance
Routing protocols
multipath routing
Routing
Protocols
composability
pubcrawl
Resiliency
biblio
A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
stochastic reward net
vulnerability checking
System Availability
stochastic model
reactive defense strategies
pull-type security patch management
phase-type approximation.
phase-type approximation
Markov regenerative process models
intrusion tolerant system
Intrusion tolerance system
composite stochastic reward net
intrusion tolerance
security of data
security patch management
pull-type patch management
periodic vulnerability checking strategy
interval availability
Markov processes
maintenance engineering
computer security
composability
pubcrawl
Resiliency
computer architecture
Servers
« first
‹ previous
1
2
3
4
5
6
next ›
last »