Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Secure and concealment in cluster based framework on vehicular networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:28pm
Roads
wireless sensor networks
Wireless Sensor Network
vehicular networks
Vehicular Communication
vehicular ad hoc networks
vehicular ad hoc network (VANET)
vehicular ad hoc network
VANET networks
telecommunication security
sensor nodes
Selfish node
security and privacy
security
secure concealment
Cloud Computing
Resiliency
resilience
pubcrawl
privacy
Metrics
MANET
lightweight cloud environment
Incentive scheme
embedded systems
Delay tolerant network (DTN)
Conferences
Compositionality
cluster based framework
biblio
Robust IoT communication physical layer concept with improved physical unclonable function
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
Ring Oscillator
Microelectronics Security
Physical Unclonable Function
pubcrawl
PUF
PUF-interfacing communication physical layer hardware
random identification hardware
reliability problems
resilience
Resiliency
Metrics
robust IoT communication physical layer
robust IoT communication physical layer concept
robust monitoring concepts
Robustness
size 65.0 nm
Spectral analysis
suitable physics
tuning
computer network security
Asia
Bandwidth
client-to-cloud communication physical layer
Cloud Computing
cloud-interfacing point
CMOS
CMOS technology
composability
aging
Conferences
generated PUF word
Hardware
hardware concepts
improved physical unclonable function
Internet of Things
IoT concept
IoT-cloud-based communication
biblio
Adaptive models for security and data protection in IoT with Cloud technologies
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
Metrics
virtualised sensor nodes
virtual reflection
sensors
sensor-cloud security
sensor-cloud architecture
security
secure association
Resiliency
resilience
Reliability
pubcrawl
Protocols
privacy
multilayer client-server model
Microelectronics Security
adaptive models
IoT
Internet of Things
Hardware
gateways
data storage
Data protection
data privacy
data integrity
computer architecture
composability
cloud technologies
Cloud Computing
authorization
authentication
application servers
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
biblio
An authorized security middleware for managing on demand infrastructure in cloud
Submitted by grigby1 on Mon, 06/11/2018 - 3:45pm
On-demand security
cloud demand infrastructure management
cloud stack
Dual authorization
Dual-Authorization
Dynamic infrastructure request control
handle On-demand Infrastructure request
IaaS
on-demand request
on-demand scheduler
auto scalability feature
on-demand service request handling
rapid elasticity
secure environment
security risks
ubiquitous computing
ubiquitous network access
virtualized computing platform
VM
middleware security
tools
pubcrawl
composability
Scalability
security of data
Cloud Computing
Servers
cloud users
virtualisation
authorization
resilience
Heuristic algorithms
security issues
middleware
Resiliency
Policy
collaboration
policy-based governance
authorized security middleware
Auto scalability
biblio
DLSH: A Distribution-aware LSH Scheme for Approximate Nearest Neighbor Query in Cloud Computing
Submitted by grigby1 on Mon, 06/11/2018 - 3:43pm
pubcrawl
Measurement
Cloud Computing
Metrics
nearest neighbor search
approximate nearest neighbor query
locality sensitive hashing
storage systems
biblio
Cloud-Side Shuffling Defenses Against DDoS Attacks on Proxied Multiserver Systems
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
security
pubcrawl
Resiliency
DDoS
composability
Cloud Computing
resilience
Metrics
Networked Control Systems Security
biblio
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection attack
pubcrawl
receiver operating characteristic curve
Resiliency
ROC curve
secure backend storage
security
security of data
smart devices
SQL
SQL injection
privacy
SQLIA
SQLIA big data
SQLIA Data analytics
SQLIA hashing
SQLIA Pattern-driven data set
Structured Query Language
structured query language injection attack
supervised learning
supervised learning model
Support vector machines
IoT
back-end database
Big Data
Cloud Computing
cloud-hosted Web applications
collaboration
confidential data
Data mining
Data models
Human behavior
Internet of Things
Artificial Intelligence
learning (artificial intelligence)
learning automata
Microsoft Azure Machine Learning
ML algorithms
pattern classification
pattern-driven corpus
Policy
policy-based governance
Policy-Governed Secure Collaboration
Predictive Analytics
biblio
Probabilistic Model Checking of Perturbed MDPs with Applications to Cloud Computing
Submitted by grigby1 on Thu, 06/07/2018 - 3:09pm
security
pubcrawl
Scalability
Cloud Computing
resilience
Resiliency
Probabilistic Model Checking
Stochastic computing
uncertainty
Markov Decision Processes
perturbation analysis
Stochastic Computing Security
biblio
Towards a Stochastic Model for Integrated Detection and Filtering of DoS Attacks in Cloud Environments
Submitted by grigby1 on Thu, 06/07/2018 - 3:09pm
security
pubcrawl
Scalability
Cloud Computing
resilience
Resiliency
Stochastic computing
DoS attacks
Performance modeling
queueing theory
Stochastic Computing Security
« first
‹ previous
…
85
86
87
88
89
90
91
92
93
…
next ›
last »