Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Design and Implementation of a Software Disaster Recovery Service for Cloud Computing-Based Aerospace Ground Systems
Submitted by grigby1 on Fri, 01/06/2023 - 4:32pm
Cloud Computing
security
pubcrawl
resilience
Resiliency
Software
Computational modeling
data centers
Circuits and systems
Aerospace accidents
aerospace ground systems
disaster recovery service mode
System recovery
biblio
A Diagnostic survey on Sybil attack on cloud and assert possibilities in risk mitigation
Submitted by aekwall on Thu, 01/05/2023 - 5:11pm
cloud
Cloud Computing
composability
Metrics
Protocols
pubcrawl
Random key Redistribution
Resiliency
Resistance
resource allocation
self-organizing networks
social networking (online)
Switches
sybil attacks
taxonomy
biblio
An Improvement on “CryptCloud$^\textrm+\$$: Secure and Expressive Data Access Control for Cloud Storage”
Submitted by grigby1 on Tue, 12/20/2022 - 7:30pm
public key cryptography
Authority Accountability
abe
auditing
Traceability
revocation
white box cryptography
Mathematics
Electronic mail
encryption
Computer bugs
composability
Access Control
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
Microservice Based Edge Computing Architecture for Internet of Things
Submitted by grigby1 on Fri, 12/09/2022 - 6:17pm
cloud
ROOF
distributed computing
Microservice architectures
Autonomic Security
fog
microservices
edge computing
AI
Scalability
computer architecture
architecture
real-time systems
composability
Resiliency
resilience
pubcrawl
Cloud Computing
Internet of Things
biblio
Autonomic Dominant Resource Fairness (A-DRF) in Cloud Computing
Submitted by grigby1 on Fri, 12/09/2022 - 6:16pm
Software algorithms
resource allocation
fairness
DRF
Dominant Resource
autonomic
A-DRF
Costs
Autonomic Security
Schedules
composability
Software
Resiliency
resilience
pubcrawl
machine learning algorithms
machine learning
Cloud Computing
biblio
Internet of Things- Cloud Security Automation Technology Based on Artificial Intelligence
Submitted by grigby1 on Fri, 12/09/2022 - 5:56pm
Artificial Intelligence
Service robots
automation
artificial intelligence security
Robot sensing systems
surveillance
Smart homes
Software systems
Software algorithms
resilience
security
Cloud Computing
composability
robots
Resiliency
Metrics
Human behavior
pubcrawl
IoT
biblio
Artificial Intelligence for Edge Computing Security: A Survey
Submitted by grigby1 on Fri, 12/09/2022 - 5:54pm
edge computing
Cloud Computing
security
pubcrawl
Human behavior
Metrics
Resiliency
privacy
composability
Literature Review
Artificial Intelligence
Measurement
resilience
Market research
Systematics
artificial intelligence security
Bibliographies
biblio
Edge-AI Platform for Realtime Wildlife Repelling
Submitted by grigby1 on Tue, 12/06/2022 - 2:52pm
Ecosystems
wireless sensor networks
Wildlife
ultrasonic imaging
Time-series Database
real-time systems
machine learning.
IoT
edge computing
6LoWPAN
controller area network
Cloud Computing
Acoustics
6L0WPAN
pubcrawl
composability
resilience
Resiliency
biblio
Empirical Analysis of Security Enabled Cloud Computing Strategy Using Artificial Intelligence
Submitted by grigby1 on Fri, 11/25/2022 - 5:49pm
Industries
security
Science of Security
Scalability
Resiliency
resilience
Reliability
pubcrawl
privacy
Policy Based Governance
Metrics
manufacturing
Artificial Intelligence
Human Factors
Human behavior
Data Security
data communication
composability
collaboration
cloud computing security
Cloud Computing
Artificial Neural Networks
artificial neural network
biblio
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
digital signature
Cryptography
Computational modeling
Elliptic curve cryptography
Mobile handsets
hashing
digital signatures
mobile
ECC
Elliptic curves
Scalability
proxy
PKI Trust Models
Cloud Computing
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »