Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Parallel Verification of Software Architecture Design
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
object-oriented programming
software architecture verification
software architecture design
parallel verification
multithreaded environment
multi-threading
monolithic architecture
large-scale complex software systems
component-based software system
Component-Based Software
Circular Dependency
Bottleneck
scalable verification
computer architecture
Compositionality
Predictive Metrics
Scalability
program verification
model checking
Software Architecture
Unified modeling language
Software systems
Production
pubcrawl
Resiliency
biblio
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Time factors
Scalable Security
Statistics
security events data
QuickAdapt
distributed BDCA system
descriptive statistics
Big Data Cyber Security Analytics
BDCA system
Adaptation
fuzzy rules
Accuracy
security of data
Scalability
quality of service
fuzzy set theory
data analysis
cyber-attacks
pubcrawl
feature extraction
cyber security
computer architecture
Big Data
Computer crime
biblio
Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
security requirements failures
pubcrawl
reconfiguring system controls
resilience
Resiliency
Runtime
Scalability
security
security and privacy
security requirements
Privacy Threats
security threats
Smart Grid
Smart Grid Privacy
Smart Grids
smart grids adaptive security
smart grids privacy
smart power grids
software engineering
software engineering vision
Human Factors
automating prevention
collaboration
composability
computer architecture
data privacy
energy producers
engineering adaptive security
failure analysis
Human behavior
Adaptive software
Metrics
Monitoring
NIST
policy-based governance
power engineering computing
power system security
privacy
privacy requirements failures
biblio
Openstack: Launch a Secure User Virtual Machine Image into a Trust Public Cloud IaaS Environment
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
tpm
policy-based governance
pubcrawl
Resiliency
Scalability
secure launch user VMI
secure user virtual machine image
security
security policy
Software
openstack
trust cloud environment
trust public cloud IaaS environment
Trusted Computing
user VMI requirements
virtual machine security
virtual machines
Virtual machining
VMI
Cryptography
cloud computing architecture
Cloud Management Platforms
cloud-delivered model
CMP
Computational modeling
computer architecture
confidentiality
cryptographic techniques
Cloud Computing
cryptology
enhanced TPM remote attestation
Human behavior
IaaS
IaaS classical processes
infrastructure-as-a-service
Launch
Metrics
biblio
Threats Against the Virtual Machine Environment of NFV
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
privilege escalation
VM escape threats
Virtualization
virtualisation
architectural modeling
Cloud Computing
computer architecture
computer network security
Hardware
misuse patterns
network function virtualization
NFV
on-demand network functions
Virtual machining
pubcrawl
security
security reference architecture
security threats
Software
UML diagrams
Unified modeling language
virtual machine environment
Virtual machine monitors
virtual machine security
virtual machines
biblio
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
Database Security
causality
centralised vector-clock architecture
chain of custody
chain of custody properties
CoC properties
commercial database systems
database audit
database audit records
auditing capabilities
digital evidence
forensically-aware distributed database architecture
hybrid logical clocks
role segregation
third-party verification
transactional databases
user transactions
Security Audits
Provenance
computer architecture
Resiliency
Human behavior
pubcrawl
Distributed databases
Forensics
Digital Forensics
Data mining
security
Proposals
database forensics
database management systems
Scalability
Clocks
auditing
action accountability
admissible audit records
biblio
An Access Authentication Algorithm Based on a Hierarchical Identity-Based Signature over Lattice for the Space-Ground Integrated Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
SGIN
lattice based mobile access authentication mechanism
lattice-based cryptography
Lattices
mobile access authentication protocol
mobile radio
mobile users
multi-access systems
private key cryptography
Protocols
L-HIBS scheme
shared session key exchange
SIS problem
small integer solution
space communication links
space-ground integrated network
standard security model
telecommunication security
theoretical cryptography
Compositionality
pubcrawl
access authentication
access authentication algorithm
adaptive selection messages
authentication
authentication delay
bidirectional authentication
composability
signature based defense
computer architecture
Cryptographic Protocols
Cryptography
digital signatures
Generators
hierarchical access authentication architecture
hierarchical identity-based cryptography
hierarchical identity-based signature
biblio
Self-Secured Control with Anomaly Detection and Recovery in Automotive Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
learning (artificial intelligence)
System recovery
sensors
self-secured control
security of data
security
Resiliency
resilience
recovery estimation error
pubcrawl
neural nets
Mathematical model
machine learning models
machine learning
Anomaly Detection
generative adversarial networks
electric vehicle
cyber-physical systems
CPS
control loop behavior
control engineering computing
computer architecture
battery management system
battery
batteries
Automotive engineering
Automotive cyber-physical systems
automotive controllers
biblio
On Pending Interest Table in Named Data Networking based Edge Computing: The Case of Mobile Augmented Reality
Submitted by aekwall on Mon, 03/02/2020 - 12:29pm
Human Factors
Ubiquitous Computing Security
remote computation
PIT expiry time
pending interest table
NDN based EC
Mobility
mobile augmented reality
latency
interest satisfaction rate
host centric IP architecture
distributed computation
storage resources
augmented reality
named data networking
security
edge computing
internet
Metrics
pubcrawl
Resiliency
computer architecture
mobile computing
Task Analysis
Internet of Things
Scalability
IP networks
Cloud Computing
security of data
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »