Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
file servers
biblio
Security system based on microcontrollers
Submitted by aekwall on Mon, 03/25/2019 - 8:57am
security system
Local area networks
magnetic contact
Magnetic field measurement
magnetic sensors
microcontroller
microsensors
movement detection measurement
process control
level measurement
sensor modules
single-chip microcontrollers
Smart Home
Temperature measurement
unauthorized entrance detection
Web server implementation
Web servers
sensor security
microcontrollers
Monitoring
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Temperature sensors
security
carbon monoxide level measurement
computerised instrumentation
development board Arduino
Ethernet interface
file servers
humidity measurement
Intelligent sensors
biblio
VM live migration time reduction using NAS based algorithm during VM live migration
Submitted by grigby1 on Wed, 07/18/2018 - 9:14am
unnecessary duplicated data transfer
Signal processing algorithms
SLA
storage data
storage management
Stress
system files
system maintenance
telecommunication traffic
Service Level Agreement
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
virtualization environment
VM live migration time reduction
zero downtime
live virtual machine migration
computer centres
datacenters
file servers
hash map-based algorithm
I-O operations
I-O Systems
i-o systems security
live migration
Cloud Computing
NAS
NAS-based algorithm
network traffic
pubcrawl
Random access memory
random-access storage
Scalability
Servers
biblio
A Multi-Level Secure File Sharing Server and Its Application to a Multi-Level Secure Cloud
Submitted by grigby1 on Mon, 03/19/2018 - 12:34pm
multilevel secure file sharing server
Servers
security of data
Security kernel
Secure File Sharing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Network file service
Multi-Level Security
Cloud Computing
multilevel secure cloud
Metrics
Kernel
Human behavior
GEMSOS
file servers
data sharing
computer security
computer architecture
composability
biblio
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
Submitted by grigby1 on Tue, 01/16/2018 - 5:36pm
file servers
Security analysis
Scalability
Resiliency
query-response mechanism
query processing
Public key
pubcrawl
Metrics
matrix algebra
LSSS matrix
Human Factors
Homomorphic encryption
fully homomorphic encryption scheme
Access Control
encryption
data retrieval scheme
data privacy security
data privacy
data access
Cryptography
collusion attack
cloud servers
Cloud Computing
ciphertext retrieval
authorisation
attribute revocation
attribute encryption
biblio
User Behavior Anomaly Detection for Application Layer DDoS Attacks
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
legitimate application layer requests
web services
Web servers
user behavior anomaly detection method
subspace anomaly detection method
student resource portal
Resiliency
pubcrawl
Protocols
protocol characteristics
principle component analysis
principal component analysis
Penetration Testing
PCA-subspace
PCA
Metrics
anomalous behavior instance detection
internet
Human behavior
HTTP Web server logs
HTTP DDoS attacks
file servers
feature extraction
distributed denial of service attacks
DDoS attack detection
Cyber Attacks
computer network security
Computer crime
composability
Browsers
application layer DDoS attacks
Anomaly Detection
biblio
Detecting Ransomware with Honeypot Techniques
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Ransomware
malware
malware form
Metrics
Microsoft file server resource manager feature
Monitoring
Network
network administrators
pubcrawl
invasive software
ransomware activity detection
ransomware attacks
ransomware detection
Resiliency
Servers
social engineering methods
Windows security logs
witness tripwire files
Electronic mail
bogus computer resources
composability
computer security
Computers
Cryptography
cyber security
decoy computers
detect
activity
EventSentry
file screening service
file servers
honeypot
honeypot techniques
Human behavior
illicit access detection
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
biblio
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 12:38pm
Linux
Web servers
Web server
UDP DDoS flood cyber attack
transport protocols
Throughput
threshold limit
TCP throughput
security problems
round-trip time
reverse path forwarding
pubcrawl170109
network load balancing
Linux Ubuntu 13
Linux platform
access control lists
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
CPU utilization
Computers
computer network security
Computer crime
authorisation
ACL
biblio
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
threshold limit
network load balancing
pubcrawl170109
resource allocation
reverse path forwarding
round-trip time
security problems
Servers
TCP throughputs
Load management
threshold limit defense
Throughput
transport protocols
UDP DDoS Attack
UDP DDoS cyber flood attack
Windows Server 2012
Windows Sever 2012
access control lists
Linux Ubuntu 13
Linux
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
cyber security
CPU utilization
computer network security
Computer crime
ACL
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism
« first
‹ previous
1
2
3
next ›
last »