Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message passing
biblio
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
microservices
software architects
service-oriented architecture
Servers
security restrictions
security of data
security
resulting microlevel policies
real-time behavior
pubcrawl
Protocols
protocol verification
policy-based governance
Policy Based Governance
Perturbation methods
CoCoME case study
microservice architectural style
message passing
macro-level security policy
macro-level policy
information-flow security policies
Information systems
information leaks
Information Flow
individual microservices
Formal Specification
cyber-physical systems
cyber-physical microservice architectures
computer architecture
collaboration
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
DNS graph mining for malicious domain detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
multiple malicious domains
IP resolutions
labeled domains
malicious domain detection technique
malicious probabilities
Malware Analysis
malware detection
Markov processes
message passing
Metrics
IP networks
Nickel
potential malicious domains
privacy
probability
pubcrawl
resilience
Resiliency
variety cyber attacks
graph mining
belief propagation
belief propagation algorithm
computer network security
cyber security
Data mining
DNS data servers
DNS graph mining
Domain Resolution
Graph Interface
attackers
graph mining task
graph node
graph theory
graph-based interface
Human behavior
Inference algorithms
internet
invasive software
biblio
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
message passing
risk management
risk assessment
Resiliency
resilience
region graph
pubcrawl
Probabilistic logic
Metrics
attack graph
Measurement
Force
factor graph
Computers
composability
Complexity theory
belief propagation
attack graphs
biblio
Exogenous Connectors for Hierarchical Service Composition
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
orchestration
web services
visualization
total compositionality
Software Architecture
service-oriented systems
service-oriented architecture
Sequential analysis
Scalability
pubcrawl
Proposals
choreography
MusicCorp
microservices
message passing
hierarchical service composition
explicit control flow
exogenous connectors
Distributed databases
Connectors
Compositionality
biblio
Acceleration of RSA processes based on hybrid ARM-FPGA cluster
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
resilience
MPI
Multicore Computing
multicore computing security
multicore desktop
multiprocessing systems
node-to-node communication
none-subtraction Montgomery algorithm
Program processors
pubcrawl
public key cryptography
microprocessor chips
Resiliency
RSA
RSA algorithm
RSA processes acceleration
Scalability
software-hardware cooperation
system-on-chip
Xilinx Zynq SoC
Zynq
FPGA fabric
Algorithm design and analysis
ARM CPU
Chinese remainder theorem
cluster
cluster infrastructure
Clustering algorithms
computer architecture
CRT
field programmable gate arrays
Acceleration
Hardware
Heterogeneous
hybrid architectures
hybrid ARM-FPGA cluster
Intel i7-3770
many-core server
message passing
message passing interface
Metrics
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime
biblio
Performance challenges for heterogeneous distributed tensor decompositions
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
pubcrawl
MPI
multi-threading
multidimensional arrays
OpenMP threads
parallel factorization
parallel processing
parallel programming
parallelization
performance evaluation
Metrics
ReFacTo
Signal processing algorithms
Sparse matrices
sparse matrix-vector multiplications
SpMV
Tensile stress
tensor decomposition
tensors
graphics processing units
canonical decomposition
Compositionality
CP-ALS
cuSPARSE library
decomposition
DeFacTo
distributed memory
distributed memory systems
gpu
alternating least squares fitting
heterogeneous distributed tensor decompositions
large-scale data analytics
Least squares approximations
Libraries
math kernel library
Matrix decomposition
matrix multiplication
message passing
biblio
Managing shared contexts in distributed multi-player game systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:17pm
Protocols
war games
SINS
Silicon compounds
shared context mapping
Semantics
security of data
secure infrastructure for networked systems
reliable middleware framework
Receivers
real-time systems
anonymous publish-subscribe
network losses-delay
multiplayer maze game
middleware
message passing
Lamport Paxos protocol
Irrigation
distributed transactional key-value store
distributed multiplayer game systems
delays
computer games
biblio
On-line transient stability analysis using high performance computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:08pm
MPI
ultrafast transient stability analysis
Transient Stability
Transient analysis
system dynamics phenomena
SuperLU_MT library
Stability analysis
sparse linear solve
real-time systems
real-time simulation
real-time environment
power system transient stability
power system stability
power engineering computing
parallelization
on-line transient stability analysis
Computational modeling
message passing interface
message passing
local file system
local disk
Large-scale systems
large-scale contingency analysis
input-output bottleneck
high performance computing machine
High performance computing
File systems
ETMSP
EPRI extended transient midterm simulation program
Dynamic security assessment
control center
« first
‹ previous
1
2