Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
P2P networks
biblio
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
smart grid advanced metering infrastructure
power data
pubcrawl
public key cryptography
public key infrastructure
public-keys
resilience
Resiliency
Servers
Smart Grid
peer-to-peer networks
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
telecommunication network management
telecommunication security
trees (mathematics)
wireless mesh networks
wireless multihop networks
Human behavior
Advanced Metering Infrastructure AMI
AMI networks
certificate revocation list
certification
Communication Network
Compositionality
distributed CRL management model
distributed hash table
distributed hash trees
advanced metering infrastructure
Human Factors
IEEE 802.11s mesh standard
key management
Logic gates
Measurement
metering
Meters
P2P networks
Peer-to-peer computing
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
biblio
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Peer-to-peer computing
Human behavior
human factor
Human Factors
internet
Internet routing infrastructure
IP networks
mining pools
P2P networks
electronic money
pubcrawl
Routing
routing advertisements
routing attacks
routing manipulation
Routing protocols
Scalability
telecommunication network routing
bitcoin security
authorisation
autonomous systems
BGP
BGP hijack
BGP hijacks
BGP routing data
bitcoin
Bitcoin hijacking
ASes
Bitcoin topology
Bitcoin traffic manipulation
Computer crime
cryptocurrencies
cryptocurrency
Cryptography
Data mining
delays
biblio
Collaborative botnet detection with partial communication graph information
Submitted by grigby1 on Mon, 12/04/2017 - 11:57am
Internet of Things
universal communication graph
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnets
partial information
partial communication graph information
P2P networks
P2P botnets
Metrics
machine learning techniques
invasive software
Internet-of-Things devices
Algorithm design and analysis
Image edge detection
graph theory
graph analysis
Error analysis
detection errors
detection algorithms
computer network security
Computer crime
Compositionality
community detection algorithms
collaborative botnet detection
centralized command & control structure botnets
botnets
biblio
Trustworthiness Management in the Social Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 1:07pm
network traffic
trustworthiness management
Trusted Computing
social networks
social networking concepts
social networking (online)
Social network services
social IoT
Social Internet of Things
reliable system
Reliability
Peer-to-peer computing
P2P networks
Analytical models
network scalability
Internet of Things
internet
information/service discovery
General
feedback exchange
distributed systems
distributed hash table structure
Computer Systems Organization
Computational modeling
Communication/Networking and Information Technology