Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Big Data
biblio
Toward Resilient Stream Processing on Clouds Using Moving Target Defense
Submitted by grigby1 on Tue, 02/18/2020 - 11:06am
pubcrawl
virtual machines
virtual machine
Task Analysis
Storms
shared computing resources
sensitive streaming applications
security of data
Scalability
Runtime
resilient stream processing
Resiliency
resilience
real-time systems
real-time stream processing
Apache Storm
Payloads
operating system
MTD
moving target defense
Metrics
Fast Data platforms
Distributed databases
distributed clusters
clouds
Cloud Computing
canonical distributed stream processing platform
Big Data platforms
Big Data
biblio
Efficient Estimation of Read Density When Caching for Big Data Processing
Submitted by grigby1 on Tue, 02/18/2020 - 10:55am
resilience
hit rate
Human behavior
MapReduce deployment
Mathematical model
Metrics
parallel processing
policy-based technique
read density
Histograms
Resiliency
runtime-space efficient computation
Scalability
Spark deployment
trace-based simulation
traditional database
Web Caching
workload traces representative
caching policy
approximate histogram
arrays
Big Data
big data processing systems
big data workloads
cache policy
cache storage
cached objects
pubcrawl
Cloud Computing
cloud workloads
Conferences
data handling
Data models
database management systems
distributed systems
biblio
Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS Log
Submitted by grigby1 on Mon, 02/17/2020 - 4:17pm
Big Data
composability
DNS
fingerprint
Metrics
pubcrawl
resilience
Resiliency
Safe Coding
situational awareness
User behavior
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 4:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
biblio
Performance, Reliability and Scalability for IoT
Submitted by grigby1 on Mon, 02/17/2020 - 4:05pm
machine learning
telecommunication network reliability
software platforms
security scalability
Scalability
robotics
risks evaluation
Reliability and Scalability
QoS for IoT
pubcrawl
Performance
5G
IoT-solutions
IoT support
Internet of Things
Industry 4.0
cooperative intrusion detection
computer network security
Compositionality
Cloud and Fog
Big Data Analytics
Big Data
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
The Security Evaluation of Big Data Research for Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 1:17pm
privacy
technological development
smart power grids
Smart Grids
smart grid system
smart grid security
smart grid attacks
security
Scalability
Resiliency
Reliability
pubcrawl
big data security metrics
power system security
power engineering computing
Metrics
machine learning
data analysis
Classification algorithms
big data technologies
Big Data research
Big Data method
Big Data Analytics
Big Data
biblio
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
smart cards
session key disclosure attacks
secure multifactor remote user authentication scheme
secure multifactor authentication protocol
resource limited devices
Kalra's scheme
communication technology
cloud-IoT environment
cloud-IoT applications
biometrics (access control)
multifactor authentication
Human Factors
security problems
Cloud Computing
password
authentication
Metrics
pubcrawl
Resiliency
embedded devices
Protocols
Cryptographic Protocols
telecommunication security
Internet of Things
Big Data
authorisation
biblio
Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data
Submitted by grigby1 on Mon, 01/27/2020 - 11:34am
risk assessment
Metrics
organisation Big Data collection
organisational aspects
policy-based governance
production engineering computing
pubcrawl
resilience
Resiliency
mamdani fuzzy inference
risk Identification
risk management
Scalability
supply chain Big Data
supply chain management
supply chain risk assessment
supply chains
Fuzzy Inference DSS mechanism
Big Data
collaboration
composability
Decision Making
decision support system
Decision support systems
emerging association patterns
FIDSS mechanism
Analytical models
Fuzzy logic
fuzzy reasoning
fuzzy set theory
Fuzzy sets
Human behavior
Human Factors
inference mechanisms
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 11:27am
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »