Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Open science, open security
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
Linux
security of data
security
production quality tools
Production
parallel processing
open security
open science
Materials
data representation
Intrusion Detection
HPC security
High performance computing
Filtering
data selection
Buildings
computer architecture
data analysis
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
biblio
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:50am
rate adaptation
Mobility First project
mobility management (mobile radio)
network protocols
non-IP protocols
offloading work
pluggable compute-layer services
programmable nodes
protocol extensions
Protocols
Mobility
rate-adaptive content delivery
Servers
service providers
service-API extensions
Streaming media
trustworthiness
video streaming
video streams
video transcoding
in-network computing
Bit rate
clean slate enhancements
cloud
compute-layer extensions
computer architecture
context-awareness
data plane
en-route service-adaptation
GENI test bed
at-scale mobility
in-network services
internet
Internet architecture
Mobile communication
mobile computing
mobile devices
mobile end-user experience
mobile wireless networks
biblio
Replication management and cache-aware routing in information-centric networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:49am
missing management
Transportation
traffic engineering approaches
telecommunication traffic
telecommunication network routing
Subscriptions
Servers
Routing
route management
replication management
Planning
performance management
network topology
native distribution network
cache management
internet
information-centrism
information-centric solutions
information-centric resources
information-centric networks
information-centric approaches
host-to-host Internet
end-to-end communication system
control plane
content distribution
computer architecture
clean-slate technologies
cache-aware routing
biblio
Dependability and Resource Optimation Analysis for Smart Grid Communication Networks
Submitted by BrandonB on Tue, 05/05/2015 - 8:35am
stochastic petri nets
resource allocation
resource resource optimization analysis
Smart Grid
smart grid communication network reliability
smart grid security
Smart Grids
smart power grids
SPN
stochastic Petri net
reliability importance
stochastic programming
telecommunication network reliability
telecommunication security
Topology
two-way interactive communication
underlie communication network
wireless mesh network
wireless mesh network technology
wireless mesh networks
network management
computer architecture
cyber-attack risk
dependability analysis
dependability modeling
intelligent resource management
Logic gates
Markov processes
mean time to failure
MTTF
Availability
next generation power distribution
Petri nets
power distribution reliability
power system security
RBD
Redundancy
redundancy mechanism
reliability block diagrams
biblio
A secure cloud computing based framework for big data information management of smart grid
Submitted by BrandonB on Tue, 05/05/2015 - 8:26am
Cloud Computing
computer architecture
Identity-based encryption
information management
Smart Grids
biblio
AccAuth: Accounting system for OAuth protocol
Submitted by BrandonB on Tue, 05/05/2015 - 7:49am
Context
user-centric accounting model
three-party communication protocol
third party application
standards
service provider
Servers
resource usage monitor
Protocols
protected resource access
OAuth protocol
delegation
AccAuth
computer architecture
Cloud Computing
authorized usage
authorized resource usage
authorization
authorisation
authentication
accounting protocols
accounting process
accounting layer
accounting
biblio
C-BAS: Certificate-Based AAA for SDN Experimental Facilities
Submitted by BrandonB on Mon, 05/04/2015 - 1:50pm
Aggregates
authentication
authentication authorization and accounting management mechanisms
authorisation
authorization
C-BAS
certificate-based AAA architecture
computer architecture
computer network management
Databases
patchy AAA infrastructure
Public key
robust AAA infrastructure
SDN experimentation facilities
Servers
software defined networking
biblio
Preserving location privacy based on distributed cache pushing
Submitted by BrandonB on Mon, 05/04/2015 - 1:10pm
markov chain
Trajectory
Servers
privacy
mobility management (mobile radio)
mobile users
mobile computing
Mobile communication
Markov processes
cache storage
location privacy preservation scheme
location privacy
location based service
Distributed databases
distributed cache pushing
data privacy
computer architecture
biblio
Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
Pipelines
Trusted Computing
stack smashing
Software
security of data
security
Runtime Security
runtime attacks
Runtime
reconfigurable dynamic trusted platform module
Reconfigurable Architecture
processor pipeline
Benchmark testing
Instruction Set Architecture
FPGA
formal verification
field programmable gate arrays
dynamic TPM design
Dynamic TPM
control flow checking
computer architecture
code reuse
buffer overflow
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
next ›
last »