Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fault tolerant computing
biblio
A Decentralized Approach to Explanatory Artificial Intelligence for Autonomic Systems
Submitted by aekwall on Mon, 03/01/2021 - 4:01pm
Autonomic systems
XAI solution
XAI functions
SISSY systems
generic decentralized architecture
explanatory artificial intelligence
explanatory AI
explanation
Decentralised Architecture
D-CAN
black box methods
autonomic management system
Autonomic Management
user trust
Scalability
xai
smart home domain
Power demand
Artificial Intelligence
Smart Home
home automation
Smart homes
cognition
fault tolerant computing
pubcrawl
Resiliency
cyber-physical systems
Runtime
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by grigby1 on Wed, 12/02/2020 - 1:01pm
massive topology degradation
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
equipment failure
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
network topology
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
pubcrawl
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
reference CSB system
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
fault tolerance
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
cloud security system
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
API interoperability issues
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
local file system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
cloud computing system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
performance evaluation
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
Cloud Computing
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 11:14am
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
computer centres
System recovery
supervisory control
Spire
sophisticated network-level attacks
simultaneous intrusions
SCADA system management
power grid infrastructure
network-attack-resilient intrusion-tolerant SCADA
nation-state-level attackers
data acquisition systems
control centers
network attack
data centers
intrusion tolerance
Power Grid
security of data
resilience
power system reliability
fault tolerant computing
power grids
Substations
network attacks
composability
pubcrawl
Resiliency
SCADA systems
SCADA
Protocols
distributed processing
Monitoring
computer network security
biblio
Intrusion-Tolerant Autonomous Driving
Submitted by aekwall on Mon, 07/27/2020 - 11:11am
Sophisticated Attacks
intrusion tolerance
well equipped adversarial teams
real time systems
predictable hardware
killer application
intrusion-tolerant autonomous driving
intrusion-tolerant architecture
intrusion tolerant design
highly skilled equipped adversarial teams
fault-and-intrusion tolerance toolboxes
fault and intrusion tolerance
complex software
real-time systems
automobiles
Autonomous Driving
distributed systems
fault tolerant computing
composability
pubcrawl
Resiliency
computer architecture
Kernel
Task Analysis
traffic engineering computing
security of data
Safety
autonomous vehicles
biblio
Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies
Submitted by grigby1 on Thu, 07/16/2020 - 10:56am
resilience
inter-layer message transmission mechanism
message passing
Metrics
Nickel
node activity test mechanism
physical backup
pubcrawl
Redundancy
hierarchical model
Resiliency
resource allocation
safety-critical key infrastructures
simulation test
simulation testing
simulations
SPB-CPS simulation test efficiency
test resources
fault tolerance
adaptive allocation
collaborative simulation time sequence push strategy
composability
Computational modeling
Control Strategy
CPS modeling
Cyber Physical System
cyber-physical systems
Adaptation models
fault tolerance policies
fault tolerant computing
Fault tolerant systems
Fault-Tolerant CPS
fault-tolerant CPS simulation platform
Hardware
hardware redundancy technology physical backup
hierarchical adaptive policies
1
2
3
4
next ›
last »