Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Load management
biblio
System Analysis of Caching Requests on Network Computing Nodes
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
netvork
Web Caching
vertical scaling
Task Analysis
systems analysis
system analysis
Scalability
Resiliency
resilience
Program processors
planing of the systems
Nodes
network computing nodes
pubcrawl
Metrics
Loading
Load modeling
Load management
internet
horizontal scaling
distributed fail-safe Web systems
Distributed databases
caching requests
caching
cache storage
biblio
EL-SEC: ELastic Management of Security Applications on Virtualized Infrastructure
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
SDN
PID controllers
Policy
Policy Based Governance
policy governance
proportional integral derivative controllers
pubcrawl
Recursive InterNetwork Architecture
resilience
Resiliency
RINA
PI controllers
Snort intrusion detection system
software defined networking
three-term control
virtual machines
virtualisation
virtualized infrastructure
virtualized network functions
virtualized security NFs
VNF Snort instances
GENI testbed
autonomic VNF instances scaling
clean slate
Cloud Computing
cloud infrastructure
collaboration
computer network security
Control Theory
EL-SEC framework
elastic management of security applications
Elastic Manager
Attack Analyzer
Human behavior
Human Factors
internetworking
Intrusion Detection
Load management
Metrics
Monitoring
Noise measurement
PI control
biblio
“Combat Cloud-Fog” Network Architecture for Internet of Battlefield Things and Load Balancing Technology
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
military computing
Internet of battlefield things
Internet of Things
Internet of Things technology
iobt
load balancing strategy
load balancing technology
Load management
load-balancing
military communication
Internef ot Battlefield Things
pubcrawl
resilience
Resiliency
resource allocation
Scalability
Task Analysis
task response latency
the-Internet-of-Battlefield-Things
Distributed databases
battlefield information
Cloud Computing
combat cloud network
combat cloud- fog network architecture
combat cloud-fog network system
combat-cloud-fog
computer architecture
computing capability
distributed computing load balancing problem
battlefield environment
distributed generalized diffusion strategy
distributed processing
edge computing
edge network equipment close
fog computing layer
fog equipment
fog-computing
Human Factors
biblio
A Privacy Preserving Model for Energy Internet Base on Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:57am
Monitoring
user behavior privacy
Sensitivity
Scalability
Resiliency
pubcrawl
privacy preserving model
privacy preserving data release
privacy preserving data mining
privacy preserving
privacy
power engineering computing
nonintrusive load monitoring
Non-intrusive Load Monitoring
NILM
Algorithm design and analysis
Load management
Human behavior
Exponential distribution
energy Internet privacy protection
energy internet
electrical data use analysis
differential privacy
Data Security
Data protection
data privacy
Data mining
data availability
composability
batteries
biblio
Cloud Task Scheduling Based on Swarm Intelligence and Machine Learning
Submitted by K_Hooper on Wed, 05/02/2018 - 10:38am
Processor scheduling
machine learning algorithm
multicriteria decision
NP-complete problem
operations research
optimisation
optimization
parallel computing
particle swarm optimization
machine learning
pubcrawl
resource allocation
scheduling
scheduling technique
Swarm Intelligence
task makespan minimization
virtual machines
Ant colony optimization
Load management
load balancing scheduling
learning (artificial intelligence)
Honey Bee Optimization
execution time minimization
distributed computing
computational complexity
composability
CloudSim toolkit package
CloudSim
Cloud task scheduling
cloud environments
cloud environment
Cloud Computing
approximation techniques
biblio
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Computational modeling
Cost accounting
encryption
Human behavior
Human Factors
Load management
privacy
privacy preservation
pubcrawl
resilience
Resiliency
Scalability
Smart Grid Privacy
Smart grids/cyber-physical systems
strategy-proofness
Vehicle-to-grid
biblio
FlowSNAC: Improving FlowNAC with Secure Scaling and Resiliency
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
VNF services
secure scaling
Secure State Migration
process control
secure state transfer
security
service degradation
Load management
product life cycle management
pubcrawl
Resiliency
Monitoring
software defined networking
stateless components
traffic steering
FlowNAC
FlowSNAC
Resilient Security Architectures
resource allocation
resource allocations
resource management
life-cycle management
network function virtualization
NFV
orchestration systems
SDN
SDN/NFV management
authentication
Degradation
biblio
Proactive DDoS attack detection and isolation
Submitted by grigby1 on Tue, 01/16/2018 - 6:24pm
legitimate clients
Servers
security controls
resource allocation
Resiliency
pubcrawl
proxy level
proactive DDoS attack isolation
proactive DDoS attack detection
MTD
Monitoring
Migration
Metrics
Load management
load balancing
Attack proxy
IP networks
insider-assisted DDoS attack mitigation
Insider-assisted DDoS attack
Human behavior
EDIP
early detection-and-isolation policy
distributed denial of service
DDoS attack detection
Data processing
cyber threat
Cyber Attacks
computer network security
Computer crime
composability
biblio
Coexistence of cellular IOT and 4G networks
Submitted by grigby1 on Thu, 04/20/2017 - 12:34pm
Internet of Things
Resiliency
pubcrawl
NB-IOT
Metrics
machine-to-machine communications
M2M applications
M2M
LTE
Long Term Evolution
Logic gates
Load management
3GPP
Human behavior
coupled CIOT-LTE architecture
computer architecture
collaboration
clean slate CIOT network
clean slate
cellular radio
cellular IoT network
Cellular IOT (CIOT)
4G network
4G mobile communication
biblio
Managing NFV using SDN and control theory
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
clean slate
collaboration
computer architecture
control systems
Control Theory
Human behavior
Intrusion Detection
Load management
Metrics
Monitoring
pubcrawl
Resiliency
Round robin
« first
‹ previous
1
2
3
4
next ›
last »