Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud environments
biblio
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
Submitted by grigby1 on Wed, 02/10/2021 - 11:52am
potentially unintentional interactions
FPGA-to-FPGA
FPGAs
GPU-to-FPGA covert channels
hardware accelerators
highly-sensitive data
independent boards
Kintex 7 FPGA chips
local cloud FPGA
off-the-shelf Xilinx boards
per-user basis
potential countermeasures
FPGA security
Power Attacks
power supply unit leakage
Power supply units
receiving circuits
reconfigurable integrated circuits
Ring oscillators
sensing stressing ring oscillators
shared infrastructures
shared power supply units
sink FPGA
source FPGA
covert channels
pubcrawl
resilience
Resiliency
field programmable gate arrays
Hardware
Scalability
cloud environments
Compositionality
Voltage measurement
Transmitters
cryptographic keys
Cryptography
Field-Programmable Gate Arrays
Temperature measurement
Voltage control
Voltage regulators
APSULe
CPU-to-FPGA
cross-board leakage
cross-FPGA covert-channel attacks
data center infrastructure
different data center tenants
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 11:32am
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 11:05am
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
IDS
threat vectors
telecommunications equipment
Support vector machines
security of data
pubcrawl
privacy
neural nets
Metrics
Measurement
learning (artificial intelligence)
cloud applications
enterprise grade security applications
enterprise applications
deep neural networks
deep learning techniques
deep learning
cybersecurity threats
Cybersecurity
cloud environments
Cloud Computing
biblio
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
Submitted by grigby1 on Tue, 01/21/2020 - 10:20am
Resiliency
learning (artificial intelligence)
machine learning
machine learning techniques
network activities
network anomalous event
pattern clustering
pubcrawl
resilience
intrusion event
secure Cloud computing environment
security issues
service consolidations
signature-based detection schemes
Support vector machines
trustworthy Cloud computing environment
ubiquitous presence
computer network security
anomaly detection system
Cloud Computing
Cloud Computing networks
cloud environments
Cloud Hypervisor level
Cloud Intrusion Detection
Clustering algorithms
composability
Anomaly Detection
Cyber Attacks
dynamic provisioning
feature extraction
hybrid detection mechanism
hybrid Intrusion Detection System
Intrusion Detection
Intrusion Detection Systems
biblio
VM processes state detection by hypervisor tracing
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
virtualisation
security
Trace Compass
virtual machine
Virtual machine monitors
virtual machines
Virtual machining
Virtual Process
virtual Process State Detection algorithm
Resiliency
Virtualization
virtualization privacy
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
Instruction sets
Cloud Computing
cloud environments
composability
Data collection
host hypervisor
host kernel tracing
Human behavior
hypervisor tracing
cloud
interactive trace viewer
Metrics
Monitoring
Performance analysis
physical host level
privacy
pubcrawl
biblio
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment
Submitted by grigby1 on Fri, 10/26/2018 - 4:05pm
Games
undesirable CSPs
security risk levels
security risk avoidance
security risk assessment
security of data
security
Scalability
risk management
quality of service
pubcrawl
online Cloud federation formation
Metrics
insecure CSPs
Human Factors
hedonic coalitional game
Cloud Computing
game theory
game theoretic security
federation formation algorithm
federated Cloud service
cooperative game
Computational modeling
coalitional game
cloud service providers
Cloud Security
Cloud federations
Cloud federation formation process
Cloud federation formation model
cloud federation
cloud environments
biblio
Cloud Task Scheduling Based on Swarm Intelligence and Machine Learning
Submitted by K_Hooper on Wed, 05/02/2018 - 9:38am
Processor scheduling
machine learning algorithm
multicriteria decision
NP-complete problem
operations research
optimisation
optimization
parallel computing
particle swarm optimization
machine learning
pubcrawl
resource allocation
scheduling
scheduling technique
Swarm Intelligence
task makespan minimization
virtual machines
Ant colony optimization
Load management
load balancing scheduling
learning (artificial intelligence)
Honey Bee Optimization
execution time minimization
distributed computing
computational complexity
composability
CloudSim toolkit package
CloudSim
Cloud task scheduling
cloud environments
cloud environment
Cloud Computing
approximation techniques
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
1
2
next ›
last »