Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Active surveillance using depth sensing technology \#8212; Part I: Intrusion detection
Submitted by grigby1 on Mon, 11/20/2017 - 11:05am
outdoor intrusion activities
wall climbing detection
video surveillance
Streaming media
skeletal trespassing detection
skeletal position monitoring
sensors
safety systems
Resiliency
real-time systems
pubcrawl
premise intrusion
active surveillance
object detection
Microsoft Kinect sensor
Metrics
loitering detection
Intrusion Detection
image sensors
Human Factors
Human behavior
depth sensing technology
computer architecture
biblio
2entFOX: A framework for high survivable ransomwares detection
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
invasive software
security mechanisms
Security Awareness
Resiliency
ransomwares behaviour
ransomware detection
ransomware attacks
Ransomware
pubcrawl
Metrics
malwares
malware detection
Malware Analysis
malware
2entFOX
Human behavior
HSR
high survivable ransomwares detection
high survivable ransomware
feature extraction
Engines
Cryptography
computer architecture
composability
belief networks
behavioral detection
Bayesian belief network
Bayes methods
biblio
Centaur: A evolutionary design of hybrid NDN/IP transport architecture for streaming application
Submitted by grigby1 on Thu, 04/20/2017 - 11:34am
IP overlay
streaming application
Routing protocols
Resiliency
pubcrawl
Prototypes
Proposals
Peer-to-peer computing
NDN streaming distribution
named data networking
Metrics
load balance
IP transmission efficiency
Centaur
IP networks
IP module functions
Internet architecture
internet
hybrid NDN/IP transport architecture
Human behavior
evolutionary design
data transfer
content distribution
computer architecture
collaboration
clean slate
biblio
Coexistence of cellular IOT and 4G networks
Submitted by grigby1 on Thu, 04/20/2017 - 11:34am
Internet of Things
Resiliency
pubcrawl
NB-IOT
Metrics
machine-to-machine communications
M2M applications
M2M
LTE
Long Term Evolution
Logic gates
Load management
3GPP
Human behavior
coupled CIOT-LTE architecture
computer architecture
collaboration
clean slate CIOT network
clean slate
cellular radio
cellular IoT network
Cellular IOT (CIOT)
4G network
4G mobile communication
biblio
Demonstrating Context-Aware Services in the Mobility First Future Internet Architecture
Submitted by grigby1 on Thu, 04/20/2017 - 11:33am
clean slate
collaboration
computer architecture
Context
Context Service
Future Internet Architectures
Human behavior
internet
Metrics
multicast
Prototype Demo
pubcrawl
Resiliency
Routing protocols
security
Software
biblio
Managing NFV using SDN and control theory
Submitted by grigby1 on Thu, 04/20/2017 - 11:33am
clean slate
collaboration
computer architecture
control systems
Control Theory
Human behavior
Intrusion Detection
Load management
Metrics
Monitoring
pubcrawl
Resiliency
Round robin
biblio
Toward the future of internet architecture for IoE: Precedent research on evolving the identifier and locator separation schemes
Submitted by grigby1 on Thu, 04/20/2017 - 11:33am
Internet connected devices
scalability issues
Scalability
Routing
Resiliency
pubcrawl
Protocols
Policy
Metrics
IP networks
Internet of Things
Internet of Everything
clean slate
internet
identifier and locator separation
Human behavior
Hip
future of Internet architecture
evolving Internet architectures
evolution of Internet
computer architecture
Communication networks
collaboration
biblio
Hypervisor-Based Attestation of Virtual Environments
Submitted by grigby1 on Thu, 04/20/2017 - 11:29am
Resiliency
Virtual machining
virtual machines
Virtual machine monitors
Virtualization
virtualisation
virtual environments
Trusted Computing
TPM device
Software
scalable remote attestation scheme
attestation
pubcrawl
private cloud
NFV
network function virtualization
Metrics
hypervisor-based attestation
Hardware
data privacy
computer architecture
Cloud Computing
biblio
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
mobile ad-hoc network
wumpus world concept
wireless mesh networks
telecommunication security
telecommunication network topology
telecommunication network routing
telecommunication network reliability
security enhancement
security
Routing attack
Routing
network topology
network survivability
network partitioning
mobile computing
Mobile communication
AMMNET
mobile ad hoc networks
Mesh networks
MANET
intragroup bridge router
intergroup bridge router
denial of service (dos)
computer architecture
communication reliability
Blackhole attack
Blackhole
bait detection scheme
Bait approach
Autonomous Mobile Mesh Network (AMMNET)
autonomous mobile mesh network
Artificial Intelligence
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
« first
‹ previous
…
50
51
52
53
54
55
56
57
58
…
next ›
last »