Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intrusion tolerance
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
biblio
An Intrusion Tolerance Scheme for a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
malicious activity
XML
Wireless communication
transaction serializability
transaction processing
transaction dependency graph
subtransactions
serializability
security of data
security
Safety
running system serialization
Resiliency
pubcrawl
processing node
malicious transactions
CDC
intrusion tolerance scheme
intrusion tolerance
graph theory
estimation
dependency
Decision Making
databases environment cloud
Databases
database management systems
Data models
concurrent access
composability
Cloud of databases environment
Cloud Computing
biblio
Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
IoT infrastructures security
threat model
software fault tolerance
smart infrastructures
sensors
security of data
Scalability
risk management method
risk management framework
risk management
Resiliency
pubcrawl
mobile devices
mobile computing
Metrics
ABA methodology
IoT
intrusion tolerance
intrusion detection system
Intrusion Detection
Internet of Things
cybersecurity mechanism
cyber security
computer security
Computational modeling
Autonomic Security
Autonomic computing
Anomaly Behavior Analysis methodology
anomaly behavior analysis
biblio
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
computer architecture
Computer crime
intrusion tolerance
Markov processes
Numerical models
Preventive maintenance
pubcrawl170109
Servers
System Availability
biblio
Towards Secure and Dependable Authentication and Authorization Infrastructures
Submitted by BrandonB on Mon, 05/04/2015 - 2:47pm
intrusion-tolerant replication
untrusted gateways
trusted components
software fault tolerance
Servers
security
resilience architecture
RADIUS
Public key
Protocols
OpenID
Logic gates
IT infrastructures
authentication
intrusion tolerance
fault-free executions
enterprise environments
diverse computing environments
dependability
authorization infrastructures
authorisation
authentication security
authentication infrastructures
authentication dependability
authentication and authorization services
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 2:59pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
biblio
Redundancy management in heterogeneous wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:58pm
query success probability
wireless sensor networks
Wireless Sensor Network
unreliable nodes detection
Tin
telecommunication network reliability
source node
signal processing
signal dissemination
Reliability
redundancy management algorithm
Redundancy
queueing theory
ad hoc network
query reliability
quality of service
probability
network efficiency
multipath routing
intrusion tolerance
Indexes
heterogeneous wireless sensor networks
geographical area
destination node
Ad hoc networks
biblio
Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:54pm
re-route detection
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
telecommunication network routing
telecommunication channels
security
Routing
redundant nodes
redundant node
all-channel analyzer
Protocols
Monitoring
intrusion tolerance mechanisms
intrusion tolerance architecture
intrusion tolerance
Intrusion Detection
expert intrusion detection analysis system
data traffic detection
data communication
biblio
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Submitted by BrandonB on Thu, 04/30/2015 - 1:33pm
quality of service
Mathematical model
military communication
military operation
misbehaving node population
Mobile communication
mobile computing
node density
Peer-to-peer computing
Protocols
intrusion tolerance
quality-of-service characters
robots
social behaviors
survivable COI management protocol
telecommunication security
Trust management
trust measurement
trust-based misbehaving node detection
Trusted Computing
connectivity
aerial vehicles
agility enhancement
application performance maximization
COI dynamic hierarchical trust management protocol
COI mission-oriented mobile group management
communication-device-carried personnel
community of interest
community-of-interest mobile groups
competence
adaptability
cooperativeness
emergency response situations
emergency services
Equations
ground vehicles
heterogeneous mobile entities
heterogeneous mobile environments
honesty
intimacy
profile
Wenbing Zhao
CPS Domains
Architectures
Secure Control Systems
Concurrency and Timing
Control
Modeling
Real-Time Coordination
Resilient Systems
Science of System Integration
Science of Security
Validation and Verification
CPS Technologies
Education
Foundations
Research Program Overview
intrusion tolerance
Byzantine Fault Tolerance
trust
Ohio
« first
‹ previous
1
2
3
4
5
6