Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Virtualization
biblio
Measuring the Impacts of Virtualization on the Performance of Thread-Based Applications
Submitted by aekwall on Wed, 07/07/2021 - 5:10pm
virtual machine
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
Windows Subsystem for Linux
Virtualization
Hardware
Threads
microsoft windows
Instruction sets
container
Linux
Containers
privacy
biblio
A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
Submitted by grigby1 on Wed, 06/30/2021 - 3:21pm
Human Factors
Virtualization
Throughput
security
Resiliency
resilience
pubcrawl
modeling
Markov processes
Analytical models
Human behavior
False Data Detection
Degradation
cyber physical systems
composability
Cloud Computing
Anomaly Detection
biblio
A New Security Framework for Remote Patient Monitoring Devices
Submitted by grigby1 on Thu, 05/20/2021 - 12:16pm
medical devices
wearables security
Wearable Device
Virtualization
Ubiquitous Computing Security
Scalability
resilience
remote attacks
pubcrawl
Protocols
Pacemakers
moving target defense
virtualization privacy
IP networks
internet
Human Factors
Computer hacking
Bluetooth jamming
Biomedical monitoring
Human behavior
privacy
Metrics
composability
Resiliency
biblio
Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:33am
resilience
virtualization servers
virtualization server
virtualization environments
SDN-based security applications
SDN-based IDS
intrusion attacks
HTTP DoS attacks
HTTP DoS
SDN networks
SDN technology
denial-of-service attack
network traffic analysis
IDS
network intrusion detection system
cloud
Cloud Computing
Virtualization
Virtual machining
malicious software
virtualisation
Switches
software defined networking
SDN
Denial of Service attacks
telecommunication traffic
composability
web services
computer network security
Resiliency
pubcrawl
Servers
biblio
MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 4:35pm
pubcrawl
manufacturing
manufacturing processes
Metrics
MTComm
MTComm based virtualization
physical machine need
physical machine operations
Policy Based Governance
production engineering computing
machine tools
resilience
Resiliency
Scalability
Solid modeling
Three-dimensional displays
virtual images
Virtualization
visualization
Digital-Twin
Cloud Computing
collaboration
composability
CPMC
Cyber Manufacturing
cyber-physical manufacturing cloud
cyber-physical systems
data visualisation
application scenarios
digital-twin simulator
Digital-Twins simulate physical world objects
Human behavior
Human Factors
image classification
Internet scale machine tool communication method
Internet-scale Computing Security
machine sensors
biblio
Future edge clouds
Submitted by aekwall on Mon, 11/30/2020 - 12:04pm
Cloud Computing
Servers
Hardware
Resiliency
Human behavior
pubcrawl
composability
Metrics
Software systems
Virtualization
policy governance
software packages
Internet-scale Computing Security
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
ontology-based security model
Virtualization
virtualisation
ubiquitous computing
tools
testing
standards
security testing
security of data
Security Metrics
security assessment architecture
security aptitude
quantifiable security assessment process
pubcrawl
application configurations
ontology-based dynamic security assessment automation
Ontology
ontologies (artificial intelligence)
Ontologies
Metrics
metrics testing
Measurement
Dynamic Application Security Testing
critical infrastructure
context-aware security assessment automation
Business
automation
application security
biblio
Comprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
encryption
Hardware
Memory management
pubcrawl
Science of Security
Virtual machine monitors
Virtualization
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »