Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Toward a Formalism to Study the Scheduling of Cyber-Physical Systems Simulations
Submitted by grigby1 on Wed, 04/20/2022 - 9:50am
DSS
simulation
scheduling
Resiliency
resilience
pubcrawl
Ports (Computers)
modelling
Metrics
HLA
Adaptation models
CPS Simulation
CPS modeling
CPS
computer architecture
Computational modeling
composability
CERTI
Atmospheric modeling
Aeronautics
biblio
CLASA : a Cross-Layer Agent Security Architecture for networked embedded systems
Submitted by aekwall on Tue, 04/19/2022 - 11:18am
Metrics
composability
Resiliency
embedded systems
computer architecture
CPS
Cross Layer Security
cross-layer
Java
Product design
pubcrawl
Reliability engineering
security
Software
software reliability
trust
biblio
Development of the Algorithm to Ensure the Protection of Confidential Data in Cloud Medical Information System
Submitted by grigby1 on Mon, 04/18/2022 - 11:38am
Cloud Computing
computer architecture
Homomorphic encryption
information security
machine learning algorithms
medical cloud information system
personal data
pubcrawl
Scalability
security scalability
standardization
telemedicine
biblio
Application Security System Design of Internet of Things Based on Blockchain Technology
Submitted by grigby1 on Mon, 04/18/2022 - 11:37am
application security
Block Chain
blockchains
computer architecture
Control engineering
Internet of Things
network security
pubcrawl
Scalability
security scalability
Systems architecture
the internet of things
biblio
Towards an Interoperable Security Policy for Space-Based Internetworks
Submitted by grigby1 on Mon, 04/18/2022 - 10:51am
Security Policies Analysis
bundle protocol
bundle protocol security
computer architecture
delay-tolerant networking
Industries
internet
NASA
network security
policy-based governance
Protocols
pubcrawl
security policies
space networking
Space vehicles
Syntactics
biblio
Development of System for Detection and Prevention of Cyber Attacks Using Artifıcial Intelligence Methods
Submitted by grigby1 on Wed, 04/13/2022 - 2:57pm
Metrics
DDoS Attack Prevention
Neighbor attacks
GAIS
DNN-based models
black hole
Wormhole
ANN
Rushing
Flooding
Scalability
computer architecture
malware
real-time systems
composability
Computer crime
telecommunication traffic
Resiliency
resilience
Human behavior
pubcrawl
deep learning
biblio
Distributed Denial of Service (DDoS) Attacks in Software-defined Networks (SDN)
Submitted by grigby1 on Wed, 04/13/2022 - 10:28am
Metrics
taxonomy
Switches
software defined networking
security
Resiliency
resilience
pubcrawl
Organizations
composability
Human behavior
distributed denial of service attack
Distributed databases
denial-of-service attack
DDoS Defense Mechanisms
DDoS attack mitigation
computer architecture
biblio
Challenges of DDoS Attack Mitigation in IoT Devices by Software Defined Networking (SDN)
Submitted by grigby1 on Wed, 04/13/2022 - 10:27am
Metrics
software defined networking
security
SDN architecture
Resiliency
resilience
pubcrawl
performance evaluation
network architecture
composability
IoT devices
Internet of Things
Human behavior
denial-of-service attack
DDoS attacks mitigation
DDoS Attacks
DDoS attack mitigation
computer architecture
biblio
User-Centric Design and Evolvable Architecture for Science Gateways: A Case Study
Submitted by aekwall on Fri, 04/01/2022 - 2:07pm
Logic gates
computer architecture
Cloud Computing
pubcrawl
Resiliency
Compositionality
Buildings
Predictive Metrics
Apache Airavata
architecture
flexible architecture
Instrument Gateways
LIMS
User centered design
user interfaces
Scientific Computing Security
biblio
Artificial Immune Technology Architecture for Electric Power Equipment Embedded System
Submitted by aekwall on Fri, 04/01/2022 - 2:06pm
information security
Trusted Computing
Systematics
surveillance
security strategy
security scalability
Scientific Computing Security
Scalability
pubcrawl
Predictive Metrics
embedded systems
Homeostasis
Embedded system information security
electric power equipment
computer architecture
Compositionality
artificial immune technology(AIT)
Metrics
composability
Resiliency
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »