Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Availability
biblio
Visualization of Security Metrics for Cyber Situation Awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:08am
Measurement
visualization
visual analytics technique
SIEM systems
security metric visualization
security information visualization
security information and event management systems
security
Olympic Games scenario
Network Security Status
network security level assessment
Abstracts
Layout
high level metrics visualization
data visualisation
data analysis
cyber situation awareness
computer network security
big data security
Big Data
Availability
biblio
Multiple OS rotational environment an implemented Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
moving target defense
testing
Servers
security of data
security
operating systems (computers)
operating systems
Nmap
multiple OS rotational environment
MTD technique
Availability
manual penetration test
IP networks
insert
Fingerprint recognition
defensive strategies
cyber-attacks mitigation
CORE Impact Pro
CORE
biblio
Intradomain and interdomain QoT-aware RWA for translucent optical networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:32am
routing-and-wavelength assignment problem
Nonlinear optics
Optical fiber networks
optical signal regeneration
physical impairments
probability
quality-of-transmission requirement
Repeaters
Routing
next-generation optical-transport networks
scalability concerns
telecommunication network routing
telecommunication security
translucent long-haul optical networks
wavelength assignment
wavelength division multiplexing
wavelength division multiplexing-based optical networks
Heuristic algorithms
backward-recursive path-computation
Bit error rate
blocking probability
BRPC
confidentiality concerns
cross-layer heuristics
dynamic programming
end-to-end service demands
Availability
interdomain QoT-aware RWA
Internet Engineering Task Force
intradomain QoT-aware RWA
multidomain path computation
multipath channels
network-level performance metric minimization
network-state information
biblio
Threats in end to end commercial deployments of Wireless Sensor Networks and their cross layer solution
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
security goals
WSNSP
wireless sensor networks
wireless sensor network service providers
Wireless Sensor Network
web services
Web servers
threats
telecommunication security
standard security documents
sensor web portals
sensor portal
attacks
security attacks
security
Portals
Mobile communication
end to end commercial deployments
Department of Homeland Security
Department of Defense
cross layer solution
cross layer security solution
commercial
Availability
biblio
Dependability and Resource Optimation Analysis for Smart Grid Communication Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:35am
stochastic petri nets
resource allocation
resource resource optimization analysis
Smart Grid
smart grid communication network reliability
smart grid security
Smart Grids
smart power grids
SPN
stochastic Petri net
reliability importance
stochastic programming
telecommunication network reliability
telecommunication security
Topology
two-way interactive communication
underlie communication network
wireless mesh network
wireless mesh network technology
wireless mesh networks
network management
computer architecture
cyber-attack risk
dependability analysis
dependability modeling
intelligent resource management
Logic gates
Markov processes
mean time to failure
MTTF
Availability
next generation power distribution
Petri nets
power distribution reliability
power system security
RBD
Redundancy
redundancy mechanism
reliability block diagrams
biblio
Analysis of Cloud Computing Performance, Scalability, Availability, amp; Security
Submitted by BrandonB on Tue, 05/05/2015 - 8:28am
Availability
Cloud Computing
Computer hacking
internet
parallel computing
parallel processing
Scalability
security
security of data
virtual machine
virtual machines
biblio
A security management for Cloud based applications and services with Diameter-AAA
Submitted by BrandonB on Mon, 05/04/2015 - 1:50pm
cloud service providers
Web based applications
Servers
security management
Protocols
internet
Diameter-AAA
diameter AAA mechanisms
Computational modeling
cloud system architecture
authentication
Cloud Security
Cloud Computing
cloud based services
cloud based applications
Browsers
Availability
authorization and accounting
authorisation
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
A New Efficient and Secure POR Scheme Based on Network Coding
Submitted by BrandonB on Thu, 04/30/2015 - 1:35pm
dispersal code
Silicon
Servers
security of data
secure POR scheme
proof of retrievability
network coding-based POR
network coding
maintenance engineering
maintenance
local data storage
encoding
efficient POR scheme
Availability
Decoding
Data Security
data integrity
data confidentiality
data communication
data checking
data availability
cost reduction
corruption attack prevention
corruption attack
Cloud Computing
« first
‹ previous
1
2
3
4