Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Proposals
biblio
A Host-based Intrusion Detection Model Based on OS Diversity for SCADA
Submitted by grigby1 on Wed, 05/05/2021 - 11:30am
pubcrawl
security
SCADA Systems Security
SCADA systems
SCADA System Security
SCADA
Resiliency
resilience
Reliability
Compositionality
Proposals
OS Diversity
Measurement
machine learning
Intrusion Detection
Human Factors
Human behavior
feature extraction
biblio
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency
Submitted by aekwall on Thu, 04/08/2021 - 3:33pm
Proposals
testing
Semantics
semantic consistency
security
Scalability
rop attacks
Resiliency
pubcrawl
Prototypes
return oriented programming
Information Reuse and Security
Human Factors
Entropy
computer architecture
Compositionality
composability
code reuse attacks
code randomization
biblio
Adaptive Caching for Beneficial Content Distribution in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:31pm
in-network caching
utility-based replacement
request arrival rate
next-generation networking
network design
in-network caching mechanism
ICN interconnections
Future Internet (FI)
content-based providers
cache diversity
beneficial content distribution
beneficial caching scheme
adaptive caching mechanism
cache hit rate
content distribution
Information-Centric Networking (ICN)
IP networks
Information Centric Networks
information-centric networking
QoS
Proposals
quality of service
network topology
service providers
Economics
internet
pubcrawl
Resiliency
data traffic
security
telecommunication traffic
Scalability
biblio
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters
Submitted by grigby1 on Wed, 12/02/2020 - 1:01pm
reduced interflow competition
virtual machines
Virtual machine monitors
unequal share
transport protocols
telecommunication traffic
telecommunication congestion control
TCP sending rate
TCP receiver window
TCP connections
TCP congestion control
Switches
Scalability
Resiliency
resilience
Registers
bottleneck capacity
Receivers
pubcrawl
Proposals
operating systems (computers)
multitenant datacenters
minimally-invasive congestion management
Internet-wide benefits
internet
hypervisor control traffic
Hardware
guest OS
datacenter
Couplings
coupled congestion control
computer centres
biblio
A Transparent Reordering Robust TCP Proxy To Allow Per-Packet Load Balancing in Core Networks
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
TCP end-points
receiver sides
Receivers
resilience
Resiliency
resource allocation
Robustness
Routing protocols
Scalability
pubcrawl
TCP packet reorderings
TCP sender end-hosts
TCP traffic
telecommunication congestion control
telecommunication traffic
Transparent reordering robust TCP proxy
transport protocols
coupled congestion control
Proposals
per-packet load balancing
packet reordering problem
packet level load balancing research
Out of order
ORTA
multiple paths
mobile network providers
low computational complexity
load-balancers
Load management
internet
high bandwidth utilization
fixed network providers
end-to-end transparency
biblio
Web Service Selection with Correlations: A Feature-Based Abstraction Refinement Approach
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
Scalability
Internet-scale Computing Security
workflow
Web service selection problem
Web service benchmarks
Silicon compounds
service selection
ordered tasks
linear workflow
feature-based abstraction refinement technique
candidate services
policy governance
set theory
Task Analysis
Proposals
Correlation
optimisation
web services
optimization
Metrics
composability
pubcrawl
Human behavior
Resiliency
Feature Selection
biblio
Requirements Patterns Structure for Specifying and Reusing Software Product Line Requirements
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
requirement engineering activities
Information Reuse and Security
SRP structure
SPLE
software requirement pattern structure
software product lines
software product line requirements
Software Product Line Engineering
software development phases
software artifacts
Requirements Reuse
requirements patterns structure
Requirements Patterns
security
RePa requirements pattern template
systems analysis
documentation
Systematics
formal verification
Compositionality
Proposals
Formal Specification
Unified modeling language
pubcrawl
Resiliency
Software
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
Analysis of IoT Botnet Architectures and Recent Defense Proposals
Submitted by grigby1 on Fri, 09/11/2020 - 11:09am
distributed denial of service attacks
IoT botnet architectures
defense proposals
computationally limited devices
botnet
architecture
defense
Compositionality
Cybersecurity
Proposals
DDoS
Metrics
computer architecture
botnets
invasive software
malware
Computer crime
malicious actors
IoT devices
computer network security
Resiliency
pubcrawl
IoT
Internet of Things
biblio
Security validation testing environment in the cloud
Submitted by grigby1 on Fri, 08/28/2020 - 2:54pm
microsoft windows
big data security metrics
security validation testing environment
MS Azure
log analysis
cybersecurity vulnerabilities
resilience
Proposals
cloud environment
tools
computer security
Scalability
Resiliency
pubcrawl
Servers
Cloud Computing
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »