Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT
Submitted by aekwall on Mon, 06/28/2021 - 12:37pm
orchestration
wireless sensor networks
tools
security services
Scalability
Resiliency
pubcrawl
performance evaluation
Performance
Fog computing
IoT
IDPS
fog nodes
Fog Computing and Security
edge computing
Containers
computer architecture
security
biblio
Fog Computing Security Assessment for Device Authentication in the Internet of Things
Submitted by aekwall on Mon, 06/28/2021 - 12:36pm
Fog computing
security
authentication
authentication requirements
Cloud Computing
computer architecture
fog architecture
Fog Computing and Security
fog security
Internet of Things
Internet of Things security
privacy
pubcrawl
Resiliency
Scalability
security management
biblio
A Comparative Study on security breach in Fog computing and its impact
Submitted by aekwall on Mon, 06/28/2021 - 12:35pm
edge computing
security breach
Scalability
Resiliency
pubcrawl
Privacy-preserving techniques
privacy issues
privacy
Fog Computing and Security
Fog computing
data privacy
computer architecture
Cloud vs Fog
Cloud Computing
challenges
Bandwidth
security
biblio
Security Issues With Fog Computing
Submitted by aekwall on Mon, 06/28/2021 - 12:34pm
Fog computing
security
Cloud Computing
computer architecture
edge computing
Fog Computing and Security
Medical services
pubcrawl
quality of service
Resiliency
Scalability
security threats
Servers
solutions
biblio
An Asset-Based Assistance for Secure by Design
Submitted by grigby1 on Thu, 06/24/2021 - 11:26am
Architecture and Design
attack pattern
Automated Secure Software Engineering
composability
computer architecture
Proposals
pubcrawl
resilience
Resiliency
secure-by-design
security
Security Assistance
software engineering
Software systems
system analysis and design
Systems architecture
biblio
A Trust-Based Security Scheme for 5G UAV Communication Systems
Submitted by grigby1 on Thu, 06/24/2021 - 10:51am
computer architecture
Unmanned Aerial Vehicles (UAVs)
Unmanned Aerial Vehicles
trust evaluation
simulation
security
resilience
Reliability
pubcrawl
policy-based governance
false trust
Pervasive Computing Security
composability
Communication Systems
Autonomic Security
5G mobile communication
5G communication
Metrics
Human Factors
Scalability
Resiliency
biblio
Utility-Optimized Synthesis of Differentially Private Location Traces
Submitted by grigby1 on Wed, 06/02/2021 - 12:18pm
Measurement
trajectory data mining
Scalability
Resiliency
resilience
Public transportation
pubcrawl
privacy-preserving data analytics
Microprocessors
Computing Theory
Markov processes
Internet of Things
Human behavior
differential privacy
Control Theory
Computing Theory and Privacy
computer architecture
privacy
biblio
Multi-Authority CP-ABE with Dynamical Revocation in Space-Air-Ground Integrated Network
Submitted by aekwall on Tue, 05/25/2021 - 3:18pm
Scalability
encryption
computer architecture
pubcrawl
policy-based governance
Synchronization
Data Security
Complexity theory
Heuristic algorithms
Computer crashes
CP-ABE
Dynamical Key Revocation (DKR)
Multi-Authority CP-ABE (MA-CP-ABE)
Space-air-ground integrated network (SAGIN)
biblio
Foggy: A New Anonymous Communication Architecture Based on Microservices
Submitted by aekwall on Tue, 05/18/2021 - 3:23pm
Safety
Scalability
computer architecture
Resiliency
pubcrawl
Metrics
metadata
testing
microservices
Prototypes
information management
Web Caching
anonymous communication
data isolation
service-oriented architecture
web cache
biblio
Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework
Submitted by grigby1 on Thu, 05/13/2021 - 2:09pm
attestation
composability
computer architecture
Hardware
Human behavior
Monitoring
network function virtualization
pubcrawl
Remote Attestation
resilience
Resiliency
security
service function chain
Software
software reliability
trustworthiness
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »