Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Indexes
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
Microservices Security
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
program compilers
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
security of data
Compositionality
moving target defense
Security Metrics
business data processing
risk analysis
Logic gates
Indexes
Software Architecture
Measurement
Metrics
pubcrawl
Resiliency
Software
security
Scalability
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
biblio
The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding
Submitted by aekwall on Mon, 11/25/2019 - 2:07pm
closed-form
uncountably many linear inequalities
symmetric multilevel diversity coding
superposition coding
robust network communication
rate tuple
linear optimization problem
explicit coding rate region
encoding
distributed data storage
Closed-form solutions
Resiliency
source coding
network coding
Indexes
channel coding
optimisation
Decoding
optimization
Metrics
composability
pubcrawl
biblio
Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
correlation-preserving coding scheme
two-way lossy transmission
two-way channels
source-channel system
rate-one separate source-channel coding
Propagation losses
Network information theory
lossy transmission
joint source-channel coding scheme
joint source-channel coding
hybrid digital-analog coding
hybrid coding
genie-aided argument
DM-TWC
discrete-memoryless two-way channels
Resiliency
channel noise
adaptive coding
adaptive codes
combined source-channel coding
channel coding
distortion
Indexes
channel capacity
Correlation
Decoding
Metrics
composability
pubcrawl
biblio
Universal Framework for Vulnerability Assessment of Power Grid Based on Complex Networks
Submitted by grigby1 on Tue, 11/19/2019 - 3:42pm
power system
weighted betweenness evaluation index
weighted betweenness
vulnerability assessment
virtual edge weight
universal method
universal framework
unified weighting model
Topology
Resiliency
resilience
pubcrawl
power system stability
power system security
complex network theory
power grids
power grid vulnerability assessment methods
power grid vulnerability analysis
nodes vulnerability
network theory (graphs)
Metrics
Indexes
Generators
edges vulnerability
distinct weighted complex network model
composability
complex networks
biblio
Vulnerability Assessment Method for Cyber Physical Power System Considering Node Heterogeneity
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
hierarchical system
Communication Network
complex network theory
cyber physical power system
different weighting factor
Dispatching
equilibrium
heterogeneity evaluation index system
hierarchical CPPS model
complex networks
island survivability
islanding survivability
network structure
node heterogeneity
short-term operation
vulnerability assessment method
power grid vulnerability analysis
Entropy
pubcrawl
Metrics
Resiliency
composability
Indexes
Communication networks
vulnerability assessment
power engineering computing
resilience
power system faults
Power system protection
network theory (graphs)
Power Grid
power grids
power flow
distributed system
biblio
Power Grid Security Improvement by Remedial Action Schemes Using Vulnerability Assessment Based on Fault Chains and Power Flow
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
power system security
vulnerable transmission lines
vulnerability index
vulnerability assessment
vulnerability assessemnt
resilient power grid
Resiliency
resilience
remedial action schemes
remedial action scheme
pubcrawl
probability
power transmission reliability
power transmission lines
power transmission faults
power system stability
Cascading Failures
Power system protection
power system faults
power grids
power grid vulnerability analysis
power grid security improvement
power flow-based method
power flow
Metrics
Load flow
large-scale blackout
Indexes
IEEE 14-bus test system
fault chains
fault chain theory
composability
biblio
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
ciphertexts
searchable encryption
searchable symmetric encryption
searchable encryptions
queried keyword
matrix-type storage
matrix-type data format
matrix-type data
location-based search
Keyword search
IoT technologies
encrypted domain
encrypted documents
data outsourcing
cloud storages
resilience
Block Cipher
advanced searchable encryption
outsourcing
personal information
Ciphers
information retrieval
storage management
query processing
Cryptography
Servers
Indexes
composability
Resiliency
pubcrawl
biblio
Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
Multi-user
Trapdoor indistinguishability
simulation program
Servers
security
secure multiuser multikeyword searchable encryption scheme
searchable encryption server
Resiliency
resilience
Receivers
random oracle model
public key cryptography
Public key
pubcrawl
privacal data
searchable encryption
multi-keyword
Indexes
encryption workload
encryption
decisional Diffie-Hellman
data user
data privacy
data owner
Cryptography
composability
cloud storage
Cloud Computing
cipher text keyword
biblio
A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
file content
wildcard SE construction
storage management
security proxy
searchable encryption
Resiliency
resilience
pubcrawl
potential storage solution
on-premises storage
local malicious staff
local index
information retrieval
Indexes
index database
Amazon S3
enterprises
encryption
efficient wildcard searchable encryption
efficient encryption
database indexing
Cryptography
constantly small storage footprint
composability
cloud storage backends
cloud storage
cloud databases
Cloud Computing
Buildings
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »