Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
response time
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
para-virtualization technique
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
operating systems
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
Virtual machining
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
security of data
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
Fog-Based Internet of Things: A Security Scheme
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
IoT devices
traditional data center
time-sensitive applications
security scheme
Scalability
response time
Resiliency
pubcrawl
Protocols
nearby light-weight middleware
MQTT protocol
MQTT
middleware
Fog computing
IoT
Internet of Things
Internet of Thing stack models
fog-based Internet of Things
Fog Computing and Security
Fog based IoT
edge computing
computer network security
computer architecture
Cloud-based IoT
Cloud Computing
security
biblio
Poster: Near Field Communication Based Access Control for Wireless Medical Devices
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
Access Control
medical devices
Near Field Communication
response time
secure pairing
1536086
biblio
CAPTCHA Recognition Algorithm Based on the Relative Shape Context and Point Pattern Matching
Submitted by grigby1 on Wed, 12/20/2017 - 12:04pm
image recognition
human beings
twisted adhesion verification code
target contour point set deformation invariance
shape feature description
shape context invariance
shape context descriptors
shape context
Shape
response time
relative shape context
recognition rate
point pattern matching
pattern matching
pubcrawl
image matching
distance uneven grouping
CSDN site verification code
CAPTCHA recognition algorithm
CAPTCHA recognition
character recognition
captchas
CAPTCHA
Context
authorisation
composability
Human Factors
Human behavior
biblio
An Improved Scheduling Strategy in Cloud Computing Using Fuzzy Logic
Submitted by grigby1 on Tue, 09/19/2017 - 10:58am
Cloud Computing
cyber physical systems
Fuzzy logic
key performance indicators
load balancing
Metrics
Processing time
pubcrawl
Resiliency
response time
scheduling
biblio
Using adaptive filtering in single-phase grid-connected system
Submitted by BrandonB on Wed, 05/06/2015 - 8:24am
Least squares approximations
variable impedance
total harmonic distortion factor
single phase grid connected system
response time
renewable energy
Pulse width modulation
power inverters
Power harmonic filters
power delivery
adaptive filtering
invertors
Inverters
harmonic distortion
energy converters
direct current
alternating current
adaptive systems
adaptive filters