Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information technology
biblio
A Construction Method of Security Mechanism Requirement for Wireless Access System Based on CC Standard
Submitted by grigby1 on Tue, 01/21/2020 - 10:33am
Safety
Wireless communication
wireless access system
telecommunication security
standards
security threats
security mechanism requirement construction method
security functions
security functional components
security evaluation standard
security assurance components
Security Assurance
Security Assessment Standards
security
Scalability
collaboration
Resiliency
resilience
radio access networks
pubcrawl
policy-based governance
Metrics
information technology
Information Assurance
incomplete security mechanism
Human behavior
emergency communication network
composability
Communication system security
Communication networks
biblio
NSTN: Name-Based Smart Tracking for Network Status in Information-Centric Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 10:26am
network operators
traditional network supervision method
traditional management information base
tracking method
status request
status data
Scalability
Resiliency
resilience
required network status information
pubcrawl
Protocols
Next generation networking
next generation network
network state information
adaptive network data location replacement strategy
network conditions
name-based smart tracking system
Management information base
IP networks
Internet of Things
information-centric internet of things
information volume
information technology
Information Centric Networks
Information Centric Network
IC-IoT
defined data tracking table
computer network management
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 10:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
2D mapping function
Two dimensional displays
speech cryptography
speech coding
modified Euler system
Lorenz 3D mapping
Henon mapping
euler numerical resolution
Chaotic Mapping
audio signal processing
audio file
audio cryptography system
3D mapping function
Cryptography
chaotic cryptography
Three-dimensional displays
chaotic communication
chaos
Predictive Metrics
information technology
composability
pubcrawl
Resiliency
Conferences
encryption
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
Intelligent monitoring of indoor surveillance video based on deep learning
Submitted by aekwall on Mon, 08/12/2019 - 8:46am
Streaming media
protection system
pubcrawl
recurrent neural nets
Resiliency
Scalability
Semantics
smart monitoring system
storage management
pose estimation
surveillance
surveillance cameras
Surveillance video
Training
video image
video signal processing
video surveillance
video surveillance system
indoor surveillance video
convolutional neural nets
deep learning
deep learning methods
deep video
fine-tuning network
high-quality segmentation mask
image retrieval
image segmentation
Cameras
information technology
Instance Segmentation
intelligent monitoring
intelligent video analytics technology
learning (artificial intelligence)
Mask R-CNN
Metrics
object detection
biblio
Automatic stabilization of Zigbee network
Submitted by aekwall on Mon, 08/05/2019 - 9:37am
Resiliency
ZigBee sub-device
ZigBee signal strength
ZigBee relay
Zigbee network
ZigBee gateway
ZigBee coordinator
Zigbee
Wireless fidelity
Wireless communication
stable ZigBee transmission
Smart homes
Smart Home
automatic stabilization
pubcrawl
power consumption
original ZigBee node
low power consumption
Logic gates
IoT
internetworking
intelligent system
information technology
expandability
computer science
composability
biblio
Security Metrics: Principles and Security Assessment Methods
Submitted by aekwall on Mon, 07/01/2019 - 9:11am
security assessment
Taxonomy of Security Metric
taxonomy
Standards organizations
security standards
security sections
security of data
Security Metrics
security metric
security measures
security conditions
security assessments
security assessment methods
Measurement
pubcrawl
Organizations
organizational security
Metrics
metric standards
Meta-Metric
information technology
information security
business data processing
benchmarking method
Benchmark testing
metrics testing
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »