Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
end users
biblio
Embedded policing and policy enforcement approach for future secure IoT technologies
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
Root-of-trust
MPSoC
platform module
policy violation
potential technical vulnerabilities
pro-active policy
pubcrawl
Quality Control
Resiliency
malicious application
secure IoT technologies
software security technologies
SPE approach
supply chain efficiencies
system communication bus
system resources
Trusted Platfrom Modules
Zero-day attacks
computer network security
ARM TrustZone
Attack vectors
authentication mechanisms
authorisation
business operations
chain-of-trust
commercial building management
composability
additional threats
embedded applications
embedded hardware
embedded systems
end users
FPGA
hardware security policy engine
Internet of Things
IoT applications
biblio
Edge Caching for Enriched Notifications Delivery in Big Active Data
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
caching policies
TTL caching
TTL based caching
Publish-subscribe
pattern clustering
notifications delivery
notification delivery
eviction-based caching
end users
edge caching
distributed broker nodes
declarative subscriptions
data management paradigm
data items
computer science
caching strategies
Big Data
bigdata publish-subscribe system
big active data systems
Big active data
BAD system
backend data cluster
Web Caching
cache storage
Distributed databases
Electronic mail
Task Analysis
Scalability
Resiliency
Metrics
pubcrawl
biblio
DDoS attack detection using machine learning techniques in cloud computing environments
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Protocols
IT technology
learning (artificial intelligence)
legacy protocols
machine learning
machine learning algorithms
machine learning techniques
management organizations
Metrics
Neural networks
on-demand resources
Intrusion Detection
pubcrawl
reduced infrastructure cost
Resiliency
security
signature detection techniques
signatures attacks
victim cloud infrastructures
Vulnerability
vulnerability detection
DDoS detection system
attacker
Cloud Computing
cloud computing environments
cloud performance
Compositionality
Computer crime
computer network security
Computers
DDoS Attack
DDoS attack detection
Algorithm design and analysis
DDoS flooding attacks
DDoS threat
Decision Tree
Decision trees
distributed denial of service
end users
Human behavior
innocent compromised computers
internet
biblio
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
IP networks
target services
Servers
Resiliency
Relays
pubcrawl
proxy-based architectures
proxy harvesting attack
Network reconnaissance
moving target defense approach
malicious client isolation
malicious client discovery
attacker reconnaissance effort
high-profile targets
end users
distributed denial of service attacks
DDoS attack mitigation
Conferences
computer network security
Computer crime
Communication networks
client-to-proxy assignment strategy
client shuffling
client remapping