Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network bandwidth
biblio
A hierarchical approach to self-test, fault-tolerance and routing security in a Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
packet-switching
local self-test manager
malformed packets
malicious denial-of-service attack
malicious external agent
microprocessor chips
multiprocessing systems
network bandwidth
network-on-chip
NoC
on-chip networks
packet switching
local router
power virus
routing agent
routing security
security concerns
sorting-based algorithm
telecommunication network routing
test algorithms
two-tier approach
two-tier solution
virtual channel flow control
virtual channels
deadlock-free properties
Scalability
resilience
Resiliency
Metrics
associated physical channels
bus interconnects
chip multiprocessors
communication efficiency
computer network reliability
computer network security
deadlock situation
network on chip security
denial-of-service attacks
external source
fault data
fault tolerant computing
fault-information
fault-tolerance aspects
fault-tolerant routing
flit-switching
hierarchical approach
internet
local processing element
biblio
A Theoretical Model for Fork Analysis in the Bitcoin Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
fork branches
Theoretical modeling
theoretical cryptography
random processes
pubcrawl
Protocols
probability
peer-to-peer network
Peer-to-peer computing
network simulator OMNET
network protocols
network bandwidth
Nakamoto consensus
historical Bitcoin data
graph theory
fork occurrence probability
bitcoin
fork analysis
Erdös-Rényi random graph construction
Cryptography
cryptocurrency
cryptocurrencies
computational complexity
Compositionality
composability
blockchain networks
Blockchain fork
block selection rules
block propagation delay
Bitcoin network
Bitcoin consensus
biblio
Reducing Frequency of Request Communications with Pro-active and Aggregated Power Management for the Controlled Delivery Power Grid
Submitted by el_wehby on Fri, 05/25/2018 - 4:36pm
controlled delivery grid
delivery scheduling
digital grid
network bandwidth
request-demand protocol
1641033
biblio
Multi-Level Security for the 5G/IoT Ubiquitous Network
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Internet of Things
Ubiquitous Computing Security
Transaction Data
Temperature measurement
security model
Scalability
Resiliency
pubcrawl
network domain
network bandwidth
multilevel security model
Multi-Level Security
Metrics
IoT
5G
information security domain
Human Factors
Human behavior
fifth-generation mobile communication networks
Context modeling
Context
computer network security
Computational modeling
BLP
Access Control
5G-IoT ubiquitous network
5G mobile communication
biblio
Malicious URL prediction based on community detection
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
malicious URL prediction
Uniform resource locators
traditional anti-virus technology
static analysis
pubcrawl170108
pubcrawl170107
program diagnostics
network bandwidth
Monitoring
Mobile communication
malware
anti-virus
Malicious URL
graph-based method
graph theory
dynamic monitoring
Data mining
computer viruses
community detection
association rules
association rule
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 10:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes