Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion tolerance
biblio
Resiliency Demands on Next Generation Critical Embedded Systems
Submitted by grigby1 on Wed, 02/26/2020 - 4:47pm
intrusion tolerance
Trojan horses
software fault tolerance
security
safety-critical software
resiliency techniques
resiliency demands
Resiliency
resilience
pubcrawl
power consumption
Circuit faults
Intelligent systems
highly critical systems
hardware bugs
Hardware
fault tolerance
embedded systems
critical embedded systems
Computer bugs
composability
biblio
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
Software
Scalability
security breaches
Security Evaluation
security of data
security patch
security patch management
security threats
Servers
push-type patch management
software assurance
software vulnerabilities
stochastic reward net
system security
virtual machine
virtual machine based intrusion tolerant system
virtual machines
VM-based intrusion-tolerant system
intrusion tolerance
attack behavior
composability
composite stochastic reward net model
Computational modeling
computer security
computer systems
defense behaviors
interval availability
Resiliency
malicious attack
Markov processes
Markov regenerative process
periodic vulnerability checking strategy
phase expansion
point-wise availability
pubcrawl
pull-type patch management
biblio
Research on Block Chain Network Intrusion Detection System
Submitted by grigby1 on Tue, 01/21/2020 - 11:20am
intrusion tolerance
WLAN
Wireless communication
system security
Resiliency
resilience
pubcrawl
network intrusion detection
network intrusion
Monitoring
Metrics
Block Chain
Intrusion Detection Systems
Intrusion Detection
detection system
computer network security
composability
Communication system security
blockchain
block chain network intrusion security
block chain network intrusion privacy
block chain network intrusion detection system
biblio
Fault Tolerance in a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
malicious transactions
Wireless communication
transaction-based applications
transaction serialization
transaction processing
transaction
serializability security
serializability
security of data
running transaction continuity
Resiliency
pubcrawl
Monitoring
Cloud Computing
intrusion tolerant scheme
intrusion tolerance
Fault tolerant systems
fault tolerant computing
fault tolerance
disk drives
Database systems
database management systems
database cloud
compromised system
composability
Cloud of databases environment
biblio
On Dependability, Cost and Security Trade-Off in Cloud Data Centers
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Fault tolerant systems
security of data
security
Resiliency
redundant resource usage
pubcrawl
priority of service requests
malicious fault
malicious attack
maintenance engineering
intrusion tolerance
Hardware
BFT
fault tolerance
dependability metric
dependability
data center
cost of service deployment
cost
computer centres
composability
cloud data centers
Cloud Computing
Byzantine Fault Tolerance
biblio
Scalability of Cloud Based SCIT-MTD
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
moving target defense
Web application
Virtual machining
share-nothing architecture pattern
Servers
self cleansing intrusion tolerance
security of data
security
SCIT
Scalability
Resiliency
quality attributes
pubcrawl
multiple instance system
multinode system
attack surface
malicious intrusions
load demand modeling
intrusion tolerance
internet
Data protection
cybersecurity protection
continuous rotation
computer architecture
composability
cloud infrastructure services
Cloud Computing
cloud based SCIT-MTD scalability
cloud
biblio
A Trust Management Based Framework for Fault-Tolerant Barrier Coverage in Sensor Networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Resiliency
wireless sensor networks
wireless senor network
trust management-based framework
TrusDet
temporal sensory output correlation
telecommunication security
telecommunication network reliability
spatial sensory output correlation
sink-level decision
sensors
sensor-level detection
Robustness
collective voting
pubcrawl
intrusion tolerance
Intrusion Detection
HC-SR501 infrared sensor
Fuses
faulty sensor recognition
fault-tolerant intrusion detection algorithm
fault-tolerant barrier coverage
Fault tolerant systems
fault tolerance
Correlation
composability
biblio
Machine learning aided traffic tolerance to improve resilience for software defined networks
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
SDN
OpenFlow
pattern classification
POX controller platform
Prediction algorithms
pubcrawl
real-time systems
ReSDN
resilience
resilience framework
Resiliency
routing table
network security
SDNs
software defined networking
Software Defined Networks
Survivability
SYN flood
telecommunication network routing
telecommunication traffic
Traffic Management
traffic tolerance
Training
feature extraction
centralised control
centralised controller
composability
computer network management
computer network reliability
computer network security
Decision Making
DoS attack
DoS attacks
Engines
attacks classification
flexible management
Future Internet
intrusion tolerance
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious intrusion detection
Mininet simulator
MIT KDD 1999 dataset
neptune attack
biblio
Meeting the Challenges of Critical and Extreme Dependability and Security
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
intrusion tolerance
ultra-resilient components
Telecommunications
sophisticated targeted attacks
Software
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Advanced and persistent threats
Hardware
fault and intrusion tolerance
extreme security risks
extreme computing
dependability risks
composability
APT
Algorithm design and analysis
advanced persistent threats
biblio
Model-Based Attack Tolerance
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
message authentication
tools
software-based systems
Robustness
Resiliency
pubcrawl
monitoring method
Monitoring
model-based testing
model-based attack tolerance
Adaptation models
intrusion tolerance
internet
generic approach
formal verification
formal method
composability
authentication Web application
authentication
« first
‹ previous
1
2
3
4
5
6
next ›
last »