Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security constraints
biblio
Security Service-aware Reinforcement Learning for Efficient Network Service Provisioning
Submitted by grigby1 on Fri, 02/17/2023 - 5:25pm
QoS
network security equipment
Network provisioning
Link state
security constraints
Costs
faces
Reinforcement learning
SDN security
pubcrawl
Prediction algorithms
SDN
network security
delays
Routing
Scalability
Resiliency
resilience
biblio
Access Pattern Hiding in Searchable Encryption
Submitted by grigby1 on Fri, 04/01/2022 - 1:09pm
encryption
Internet of Things
search problems
Cloud Computing
Servers
pubcrawl
resilience
Resiliency
privacy
data privacy
composability
searchable encryption
access pattern
security and privacy
security constraints
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
Security and Performance Modeling and Optimization for Software Defined Networking
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
Performance modeling
Web servers
telecommunication traffic
software defined networking
security optimization approach
Security Optimization
Security modeling
security constraints
security
SDN
Scalability
Resiliency
resilience
queueing theory
pubcrawl
Computing Theory
performance constraints
optimization
networking capabilities
network traffic
Measurement
graphical security models
genetic algorithms
genetic algorithm
Generators
Databases
computer network security
communication demands
big data security metrics
Security Metrics
biblio
Security modalities on linear network code for randomized sources
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
randomized sources
network coding
number random symbols
optimally secure information transmission
Peer-to-peer computing
pubcrawl
r-secure
random keys
random source symbols
randomized source messages
Metrics
resilience
Resiliency
Secure network code
security
security constraints
security modalities
telecommunication security
weakly secure
wiretapped network
information symbols
composability
computational security
Conferences
cryptographic measure
Cryptography
encoding
illegitimate users
imperfectly secure
information rate
adversaries
information theoretic approach
information theoretic security bounds
Knowledge engineering
linear codes
linear network code
linear network coding scheme
Mathematical model
maximized information transmission
biblio
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 1:44pm
security
model checking
openstack
pubcrawl
quality of service
real cloud scenarios
Resiliency
Scalability
SecSLA model
Metrics
Security Conformance
security constraints
security of data
security SLA
storage management
UPPAAL
Virtual machining
CloudBeh model
big data analysis
big data security metrics
Cloud Computing
Cloud Modeling
cloud service behaviors
cloud service provider
cloud service security conformance
cloud storage service
Big Data
CloudBeh performance metrics conformance
CloudSec
Computational modeling
contracts
CSP
data analysis
Measurement
biblio
Operating system security by integrity checking and recovery using write-protected storage
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
buffering mechanism
cryptographic hashes generation
database management systems
file backups
file system integrity
hashes database
ICAR system binaries
integrity checking and recovery system
Linux
Linux security model
security constraints
security database management
security of data
system security
unauthorised modification
write-protected storage