Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
metadata
biblio
A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
Hybrid Blockchain
XOR Global State(XGS)
XOR global state
system trust
smart contracts
Servers
Scalability
Public key
pubcrawl
private key cryptography
privacy breach
privacy
owner private key
modification
metadata
hybrid blockchain-based XGS
append-only distributed ledger
Distributed databases
Distributed Database
deletion
database technology
data privacy
data deletion
create-retrieve-append-burn
CRAB method
contents modification
contents deletion
blockchain
block-chained hybrid blockchain system
authentication
arbitrary modifications
arbitrary injection
biblio
Towards a TRansparent I/O Solution
Submitted by aekwall on Mon, 06/01/2020 - 10:49am
source code
preceding graph
pubcrawl
Regulated I/O
resilience
Resiliency
reusable components
security
security of data
Semantics
software reusability
policy-based governance
source code (software)
storage back-end
storage platforms
Strips
Transparent I/O
transparent I/O solution
Web service scenario security
web services
workload diversity
in-transit processing
complex storage solutions
composability
cost reduction
custom code
data distribution
data lands
encryption
graph chain
In transit engine
application behaviors
infrastructure level
infrastructure setup
infrastructure-related changes
Libraries
Logic gates
management code
metadata
middleware
middleware security
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
Beyond Pixels: Image Provenance Analysis Leveraging Metadata
Submitted by aekwall on Mon, 03/30/2020 - 11:34am
meta data
provenance graph construction
Phylogeny
Painting
online multimedia
noncontent-based information
metadata-based inferences
image provenance analysis
cultural analytics
automated provenance analysis
Provenance
inference mechanisms
Semantics
visualization
Task Analysis
digital image forensics
Image forensics
multimedia computing
video signal processing
metadata
internet
Metrics
Image edge detection
graph theory
composability
pubcrawl
Human behavior
Resiliency
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
graph segmentation operator
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
approximation theory
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
optimisation
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
Data models
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling
biblio
Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data Object
Submitted by grigby1 on Tue, 02/18/2020 - 11:54am
Scalability
optimization
optimum knapsack solutions
performance measures per data object
QoS measures
quality of service
rank exchange caching (REC)
rank exchange caching methods
resilience
Resiliency
object hit ratio
score-gated polling (SGP)
simulative evaluation
TE
Throughput
time 25.0 year
time 50.0 year
traffic engineering
Web Caching
web caching strategies
efficient Web caching methods
5G mobile communication
byte hit ratio
cache content
cache storage
Correlation
CPU caches
data chunk storage
Database systems
delays
pubcrawl
generalized value hit ratio
Greedy-Dual
hit ratio optimization and bounds
independent request model
internet
LFU
LRU
metadata
Metrics
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 5:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Securing HPC using Federated Authentication
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
PKI
the U.S. Government PKI
multifactor authentication process
Multi-factor authentication
In Common Federation
HPC system security
federated identity management
federated authentication
external federated identity management systems
basic account maintenance
multifactor authentication
US Department of Defense
public key infrastructure
authorisation
Portals
Human Factors
parallel processing
High performance computing
message authentication
authentication
metadata
Metrics
pubcrawl
Resiliency
learning (artificial intelligence)
security
biblio
SoK: Shining Light on Shadow Stacks
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
return oriented programming
metadata
Metrics
optimization
Payloads
performance comparisons
program compilers
program diagnostics
pubcrawl
Registers
Resiliency
Memory Protection
return-oriented-programming
Scalability
security
security of data
shadow stack design
shadow stacks
shadow-stacks
Software
software security mitigations
virtual calls
control-flow-integrity
C++ languages
CFI mitigations
compatibility
compiler designers
compiler security
composability
Compositionality
control-flow hijacking attacks
control-flow integrity solutions
control-flow-hijacking
backward edge
defense mechanisms
deployed mitigations
dominant attack vector
forward edge
fully precise mechanism
Human Factors
indirect calls
language-based-security
low performance overhead
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »