Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Optimizing Quantum Circuits for Modular Exponentiation
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
pubcrawl
verilog implementation
tools
scalable synthesis methods
Scalability
reversible modular exponentiation function
Resiliency
Qubit
Quantum error correction
Quantum Error Correcting Codes (QECC)
quantum computing
quantum computers
quantum circuits
quantum architectures
Quantum Algorithm(QA)
computer architecture
modular exponentiation functions
modular exponentiation
Logic gates
logic designs
logic design
logic circuits
linear nearest neighbor property
Linear Nearest Neighbor (LNN)
Hardware design languages
hardware description languages
exponentiation functions
exponentiation
error correction
biblio
TCP/IP and ICN Networking Technologies for the Internet of Things: A Comparative Study
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
caching
TCPIP
TCP/IP stack
TCP/IP
packet level security
naming
IP-based technologies
IoT requirements
IoT environments
interconnecting resource-constrained devices
information-centric networks
information-centric networking paradigm
ICN networking technologies
communication paradigms
computer network security
Low-Power and Lossy Networks
6LoWPAN
Routing protocols
internet
composability
pubcrawl
Resiliency
transport protocols
computer architecture
IoT applications
security
Internet of Things
IP networks
biblio
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
machine learning-based systems
Training
telecommunication traffic
Scalability
robust network security systems
raw-traffic feature representations
Raw Measurements
pubcrawl
privacy
pattern classification
networking attacks
network traffic
network security applications
malware network traffic
malware detection
malware
Expert Systems and Privacy
learning (artificial intelligence)
invasive software
Human Factors
feature extraction
expert systems
expert handcrafted features
deep learning-based malware traffic detection
deep learning models
deep learning
Data models
computer network security
computer architecture
classification
Analytical models
Human behavior
biblio
Reconfigurable Architecture to Speed-up Modular Exponentiation
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
modular exponentiation
Xilinx Virtex 7 FPGA
Scalability
RSA protocols
Resiliency
reconfigurable architectures
Reconfigurable Architecture
random number generation
Random access memory
public key cryptography
pubcrawl
pseudorandom number generator
Pre-computation techniques
Modular Multiplication
batch multiplication
hardware architecture
Hardware
frequency 200.0 MHz
FPGA
field programmable gate arrays
exponentiation
digital arithmetic
Diffie-Hellman like protocols
Diffie-Hellman key pair
Cryptography
computer architecture
computationally intensive cryptographic operations
Clocks
biblio
Balancing Security Guarantees vs QoS Provisioning in Combined Fog-to-Cloud Systems
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
efficient management solution
significant proportion
security of data
Scalability
resulting scenario
resource management
Resiliency
quality of service
QoS-Security trade-off
QoS provisioning
pubcrawl
Fog-to-Cloud
Fog Computing and Security
Fog computing
delivered QoS
decoupled transversal security strategy
DCF
Cryptography
computer architecture
combined fog-to-cloud systems
Cloud Computing
challenging aspects
balancing Security guarantees
authentication
architectural oriented policy handling
security
biblio
A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
Submitted by aekwall on Mon, 12/30/2019 - 12:15pm
UBP
privacy
pubcrawl
Resiliency
Scalability
secure vehicular platform
security mechanism
Traffic congestion
traffic engineering computing
Prediction algorithms
user behavior profiling
VANET
VCC
vehicle computing service requests
vehicle storing service requests
vehicular cloud computing
vehicular cloud servers
Vehicular fog computing
edge computing
security
Cloud Computing
computer architecture
data privacy
Data processing
data servers
Decoy technology
distributed processing
Fog computing
encryption
energy consumption reduction
Fog Computing and Security
fog computing architecture
fog computing system
Monitoring
power aware computing
biblio
MAEC-X: DDoS Prevention Leveraging Multi-Access Edge Computing
Submitted by grigby1 on Wed, 12/18/2019 - 2:44pm
Human behavior
Resiliency
resilience
pubcrawl
Protocols
network security
multitier networking
multiaccess edge computing
Monitoring
Metrics
MAEC-X
Internet-of-Everything era
internet
5G mobile communication
edge computing
denial-of-services attacks
DDoS prevention solution
DDoS prevention
DDoS Attacks
DDoS Attack Prevention
computer network security
Computer crime
computer architecture
composability
5g network
biblio
SENAD: Securing Network Application Deployment in Software Defined Networks
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
network programmability
app-to-control threats
application plane controller
Computer crashes
data plane controller
DPC
dubbed SENAD
malicious command injection
network application deployment
APC
OpenFlow entries
resource exhaustion attack
resource isolation
SDN architecture
Software Defined Networks
telecommunication control
telecommunication network management
Resiliency
Access Control
authorisation
authorization
Runtime
Software
computer architecture
computer network management
software defined networking
computer network security
pubcrawl
composability
Metrics
SDN controller
process control
network management
command injection attacks
biblio
Secure IoT for a Pervasive Platform
Submitted by grigby1 on Tue, 11/26/2019 - 3:42pm
pubcrawl
ubiquitous computing
software elements
Software
smart communication-enable devices
Servers
security
secure IoT
secure element
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
computer architecture
pervasive systems
pervasive platform
Pervasive Computing Security
pervasive computing
pervasive applications
Metrics
Internet of Things
Human Factors
human factor
Human behavior
Hardware
end-to-end security level
computer network security
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 10:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »