Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
File systems
biblio
RockFS: Cloud-Backed File System Resilience to Client-Side Attacks
Submitted by grigby1 on Thu, 01/31/2019 - 11:23am
cloud
Cloud Computing
File systems
Intrusion Recovery
Metrics
privacy
pubcrawl
resilience
Resiliency
Scalability
Secure File Sharing
System recovery
user privacy
user privacy in the cloud
biblio
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault Tolerance
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
anti-forensics
composability
detection
fault tolerance
File systems
hashing
Information hiding
Metrics
privacy
pubcrawl
robust
security
Slack Space
Steganography
steganography detection
Threshold secret sharing
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
Secured and Reliable File Sharing System with De-Duplication Using Erasure Correction Code
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Reliability
file-level deduplication system
file sharing system
File systems
Human behavior
Metrics
optimized storage
Peer-to-peer computing
pubcrawl
Reed Solomon Code
error correction codes
resilience
Resiliency
RSA encryption
Secure File Sharing
Secure storage
Servers
storage management
storage space
video files
Cryptography
authorized storage
Ciphers
cipher texts
Cloud Computing
cloud providers
cloud service subscriber
cloud storage servers
composability
computer network reliability
AES encryption
data deduplication technique
data encryption
data owners
de-duplication
encrypted file reliability
encrypted files
encryption
erasure correcting code
erasure correction code
biblio
Challenges of Cloud Computing amp; Big Data Analytics
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
AaaS
Big Data
Big Data Analytics
Cloud Computing
data analysis
Distributed databases
File systems
Hadoop
HDFS
Honey Pot Nodes
manufacturing
Map Reduce
Organizations
pubcrawl170114
security
biblio
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
ExFAT
pubcrawl170109
process monitoring
media mirror
legal effect
lawsuit
Law
judicial identification
hash authentication
Forensics
File systems
file location algorithm
file locating
file character code algorithm
file character code
ExFAT file system
Algorithm design and analysis
evidence recovery
electronic data recovery forensics
electronic data
document fragment reassembly algorithm
document fragment
Distributed Bragg reflectors
digital signatures
digital multisignature
Digital Forensics
destroyed situation
data recovery
Data models
Cryptography
Computer crime
Classification algorithms
biblio
On-line transient stability analysis using high performance computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:08pm
MPI
ultrafast transient stability analysis
Transient Stability
Transient analysis
system dynamics phenomena
SuperLU_MT library
Stability analysis
sparse linear solve
real-time systems
real-time simulation
real-time environment
power system transient stability
power system stability
power engineering computing
parallelization
on-line transient stability analysis
Computational modeling
message passing interface
message passing
local file system
local disk
Large-scale systems
large-scale contingency analysis
input-output bottleneck
high performance computing machine
High performance computing
File systems
ETMSP
EPRI extended transient midterm simulation program
Dynamic security assessment
control center
biblio
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Submitted by BrandonB on Thu, 04/30/2015 - 12:38pm
Inter-operable Heterogeneous Storage
trust boundaries
storage technologies
storage systems
storage management
Servers
Self Certifying File Systems
public keys
public key cryptography
Public key
Prototypes
network layer
Name Orientated Networking (NON)
IP networks
CCFS
integrity verification
information-centric networking
information networks
Information Centric Networks (ICN)
Google
File systems
file hashes
Delay Tolerant Networking (DTN)
cryptographically-curated file system
cryptographically strong content identifiers
Cryptographically Curated File System (CCFS)
Content Centric Networking (CCN)
content authentication
« first
‹ previous
1
2
3
4