Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
queueing theory
biblio
An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
queueing theory
MQTT broker
MQTT protocol
MQTT Thing-to-Thing Security
MQTT-TLS
MQTT-TTS
Payloads
Protocols
pubcrawl
Metrics
resilience
Resiliency
secure data exchange
telemetry
thing-to-broker channel encryption
Thing-to-Thing Security enhancement
Transport Layer Security
Human behavior
composability
computer network security
Cryptographic Protocols
data communication
data exchange protocol
electronic data interchange
encryption
end-to-end security
ciphertext-policy attribute based encryption
Human Factors
Internet of Things
Internet of things environment
IoT application developers
IoT security
massive IoT devices
Message Queue Telemetry Transport
biblio
Modeling of Blockchain Based Systems Using Queuing Theory Simulation
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
Online banking
queuing theory simulation
Queuing theory for blockchain
M/M/n/L queuing system
leading technology
Blockchain using jsimgraph
Blockchain simulation
blockchain based systems
Bitcoin queuing simulation
network accountability
accountability
auditability
queueing theory
Queueing analysis
Resiliency
Smart Home
Data mining
social networks
internet
blockchain
Metrics
social networking (online)
Computational modeling
Peer-to-peer computing
bitcoin
composability
pubcrawl
biblio
Features of Application of Data Transmission Protocols in Wireless Networks of Sensors
Submitted by aekwall on Mon, 02/17/2020 - 2:35pm
internetworking
secure IoT-solution mechanisms
radiotelemetry
publisher-subscriber architecture
protecting devices
network servers
messages
Message Queue Telemetry Transport protocol
gateways
device authentication protection
data transmission protocols
certificate-based authentication
data
queueing theory
sensor networks
protocol
computer network security
sensors
sensor security
authentication
internet
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
transport protocols
Software
Protocols
Internet of Things
biblio
Modeling and evaluation of a new IoT security system for mitigating DoS attacks to the MQTT broker
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
low power devices
DoS attacks
generic IoT system
high interaction
high mobility
host Intrusion Detection System
human activities
human control
Internet of Things phenomenon
IoT security system
Denial of Service attacks
Message Queue Telemetry Transport protocol
MQTT
MQTT broker
queueing theory
security over IoT
structured activities
telemetry
actuator security
Human behavior
computer network security
IDS
Monitoring
Internet of Things
security
Protocols
transport protocols
Resiliency
IoT
pubcrawl
composability
Metrics
quality of service
Proposals
Floods
DoS
actuators
biblio
Dynamic Traffic Control System Using Edge Detection Algorithm
Submitted by grigby1 on Wed, 05/01/2019 - 11:33am
Traffic congestion
road traffic control
road vehicles
Roads
Scalability
security
smart city-smart travel
smart phone applications
smart phones
Resiliency
traffic engineering computing
Traffic light
traffic monitoring
traffic signal lights
transport network
vehicles
vehicular queuing
Workstations
Image edge detection
Communication networks
composability
congestion frequency detection
digital image processing techniques
dynamic traffic control system
edge detection
edge detection algorithm
electronic sensors
Cameras
Image Processing
image sequence
image sequences
magnetic coils
Metrics
pubcrawl
queueing theory
resilience
biblio
Towards a Stochastic Model for Integrated Detection and Filtering of DoS Attacks in Cloud Environments
Submitted by grigby1 on Thu, 06/07/2018 - 3:09pm
security
pubcrawl
Scalability
Cloud Computing
resilience
Resiliency
Stochastic computing
DoS attacks
Performance modeling
queueing theory
Stochastic Computing Security
biblio
One more queue is enough: Minimizing flow completion time with explicit priority notification
Submitted by grigby1 on Wed, 02/21/2018 - 1:49pm
Resiliency
packet switching
policy governance
Policy-Governed Secure Collaboration
Processor scheduling
pubcrawl
queue
queueing theory
resilience
Metrics
scheduling
scheduling mechanism
switch priority queues
Switches
TCP
telecommunication traffic
transport protocols
fine-grained priorities
clean slate
clean-slate switch hardware
collaboration
commodity switches
computer centres
Conferences
Dynamic scheduling
EPN
Bandwidth
flow completion time
flow scheduling
flow size information
Hardware
Human behavior
human factor
Human Factors
biblio
Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
QoS
VM-based intrusion tolerant systems
Virtualization
virtual machines
virtual machine
Time factors
security of data
security
Resiliency
queueing theory
quality of service
composability
pubcrawl
MTTSF
mean time to security failure
Markov processes
Markov model
intrusion tolerance
Electronic mail
Computers
Computational modeling
biblio
A Modelling Framework for Managing Risk-Based Checkpoint Screening Systems with Two-Type Inspection Queues
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
pubcrawl170112
two-type inspection queues
supply chains
Steady-state
Stability analysis
Selectee Lanes
security checkpoints
security checkpoint
security
risk-based checkpoint screening system management
risk level
queueing theory
Airports
optimization model
optimisation
Normal Lanes
National security
multi-server queue
mix-integer non-linear programming model
inspection queues
Inspection
delays
congestion
Biological system modeling
biblio
Quantifying cyber-resilience against resource-exhaustion attacks
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
Queueing analysis
stress-strain curve
Stress
Strain
simple queuing system
Servers
security of data
resource-exhaustion attacks
resilience
queuing theory
queueing theory
cyber security
networked queuing systems
Mechanical Engineering
material science
linguistic terms
Information systems
information sciences
information science
engineering terms
cyber-resilience quantification
cyber systems
« first
‹ previous
1
2
3
next ›
last »