Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data transfer
biblio
Design and Implementation of a Consensus Algorithm to build Zero Trust Model
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
distributed systems
zero trust model
zero trust
trust model
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Human Factors
Acoustic Fingerprints
distributed ledger
Distributed databases
data transfer
Data Security
Consensus algorithm
Conferences
Companies
blockchain
biblio
Developing Root Problem Aims to Create a Secure Digital Signature Scheme in Data Transfer
Submitted by aekwall on Mon, 02/08/2021 - 1:44pm
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
information technology
digital signature
electronic data interchange
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
data transfer
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 11:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Moving Bits with a Fleet of Shared Virtual Routers
Submitted by grigby1 on Tue, 12/01/2020 - 4:36pm
Scalability
Metrics
networking community
offloading network functionality
on-demand instances
Policy Based Governance
price disparity
Pricing
pubcrawl
resilience
Resiliency
IP transit prices
shared virtual routers
telecommunication network routing
telecommunication network topology
third-party cloud spot instances
traffic demands
transit providers
unit pricing
virtual network provider
virtualisation
Economics
bandwidth costs
Cloud Computing
cloud providers
cloud-assisted networks
collaboration
composability
computing resources
data transfer
data transfers
dedicated resources
Bandwidth
flexible network service chains
Human behavior
Human Factors
internet
Internet core hubs
Internet ecosystem
Internet-scale Computing Security
Internet-scale interconnections
IP networks
biblio
The development of the data transfer protocol in the intelligent control systems of the energy carrier parameters
Submitted by aekwall on Mon, 11/23/2020 - 11:21am
accounting of the energy carrier consumption
Intelligent Data and Security
Intelligent Data Security
Wireless Smart Sensors
wireless smart sensor
thermodynamic parameters
reliable data transmission
radio channel
intelligent control systems
heat control system
energy measurement
energy carriers
energy carrier parameters
data transfer protocol
control signals delivery
control devices
Scalability
wireless network
data transfer
security devices
intelligent control system
intelligent control
Compositionality
integrated circuits
Automation systems
Wireless communication
wireless sensor networks
pubcrawl
Resiliency
Software
Protocols
biblio
Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
intelligent transportation system stakeholders
Vehicular cloud
security selection criteria
security of data
security criteria
Resiliency
pubcrawl
Metrics
Memory
IoT-based smart city
Internet of Vehicles
Internet of Things
Intelligent Transportation Systems
Business
Human Factors
Human behavior
Evaluation and Selection
encryption
data transfer
data privacy
data exchange
cyber physical systems
context-based analysis pattern
computer architecture
cloud-based vehicular cloud
Cloud Computing
biblio
Re-envisioning digital architectures connecting CE hardware for security, reliability and low energy
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
personal area networks
data transfer
digital architectures
Local area networks
Low power
low-power components
multiple bridged peripheral links
network architecture
Network of Things
peripheral interfaces
data network architecture
private universal data platform
push-pull data network architecture
scalable switchable data platform
Software Constructed ad-hoc circuit network
ultra-low power data platform
universal peripheral communications links
USB 3.0
USB 3.0 data transfer cables
Ad hoc networks
Hardware
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
privacy
internet
data privacy
electronic data interchange
Network Security Architecture
CE hardware
Consumer Data
consumer electronic systems
Consumer electronics
data connectivity technologies
data exchange
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
A two-layer network Orchestrator offering trustworthy connectivity to a ROS-industrial application
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
production engineering computing
Trustworthy Systems
trustworthy network
trustworthy connectivity
Trusted Computing
to-end Ethernet flows
Three-dimensional displays
Service robots
ROS-industrial application
ROS-I
ROS
robotic operating system industrial distributed application
Robot sensing systems
Resiliency
Reliability
pubcrawl
composability
orchestrated two-layer network test-bed
Optical fiber networks
operating systems (computers)
network orchestrator
Local area networks
industrial robots
industrial robotics
fiber outage
end-to-end flow services
data transfer
data exchange
cyber physical systems
control engineering computing
computer network security
biblio
Adding Support for Theory in Open Science Big Data
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Predictive Analytics
Frameworks
functional data analysis
Human behavior
Human Factors
Mathematical model
Metrics
natural sciences computing
open science big data
Economic indicators
Principal differential analysis
Provenance
pubcrawl
Resiliency
storage management
theory
theory formation
Analytical models
data transfer
data storage
data sources
data provenance
data privacy
Data models
data fitting
data curation
data analysis
Compositionality
composability
citable reusable data
Biological system modeling
Big Data Analytics
Big Data
« first
‹ previous
1
2
3
next ›
last »