Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud applications
biblio
Rethinking Authorization Management of Web-APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:20pm
Mobile Applications
web services
Web APIs
third party web
service providers
security policies
resource sharing
Resiliency
resilience
pubcrawl
mobile computing
API
data fragments
Compositionality
Cloud Computing
cloud applications
authorization management
authorisation
application programming interface
application program interfaces
APIs
biblio
Remote Monitoring and Online Testing of Machine Tools for Fault Diagnosis and Maintenance Using MTComm in a Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 3:35pm
prognosis
maintenance engineering
manufacturers
manufacturing
manufacturing operations
Metrics
MTComm
performance evaluation
Policy Based Governance
Probes
product quality
product quality prediction
production engineering computing
maintenance
pubcrawl
remote monitoring
remote online testing
resilience
Resiliency
RESTful Web services
Scalability
Servers
testing
testing operations
web services
cyber-physical systems
cloud applications
Cloud based fault diagnosis
Cloud Computing
collaboration
component level
composability
condition monitoring
Conferences
CPMC
cyber physical manufacturing cloud
cyber-physical manufacturing cloud
Anomaly Detection
factory floor data
fault diagnosis
fault diagnosis system
heterogeneous machine tools
Human behavior
Human Factors
Internet scale communication method
Internet-scale Computing Security
machine health monitoring
machine tool communication
machine tools
biblio
An abstraction layer for cybersecurity context
Submitted by grigby1 on Fri, 05/08/2020 - 1:20pm
Metrics
virtual services
telecommunication security
software components
security-related data
security of data
security context
security appliances
Resiliency
resilience
pubcrawl
object-oriented programming
object oriented security
cloud applications
lightweight inspection
IoT devices
Internet of Things
heterogeneous sources
flexible abstraction layer
enforcement hooks
cybersecurity context
cyber-security frameworks
cyber-attacks
composability
Cloud Computing
biblio
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
IDS
threat vectors
telecommunications equipment
Support vector machines
security of data
pubcrawl
privacy
neural nets
Metrics
Measurement
learning (artificial intelligence)
cloud applications
enterprise grade security applications
enterprise applications
deep neural networks
deep learning techniques
deep learning
cybersecurity threats
Cybersecurity
cloud environments
Cloud Computing
biblio
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:27pm
Scalability
information-centric cloud network security
network virtualization
networking aspects
performance requirements
provision network resources
pubcrawl
resource management
Routing
information centric services
SDN-based framework
security
software assurance
software defined networking
software-defined networking
virtual networks
virtualisation
Virtualization
computer centres
Cloud Computing
cloud data centers
cloud infrastructure
cloud network resources
cloud provider
cloud services
cloud user
composability
cloud applications
computer network performance evaluation
computer network security
delays
fully distributed data plane
information centric cloud framework
Information Centric Cloud Networking
information centric networking
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines