Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cloud Computing
biblio
Real time car parking system: A novel taxonomy for integrated vehicular computing
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
mobile cloud
content delivery services
data dissemination
data-disseminated real-time services
distributed computing
distributed remote cloud
fog-edge computing
GH-311RT ultrasonic distance sensor
ICCP prototype testbed
improper parking management scheme
Infrastructure-to-Vehicle
integrated communication-computing platforms
integrated vehicular computing
LinkSprite 2MP UART JPEG camera module
connected Vehicular Clients
networked fog centers
parking lot
real-time cloud
road side sensor based monitoring
self-energized Fog nodes/data centers
SHARP 2Y0A21 passive infrared sensor
smart car parking management
smart car parking system
time car parking system
Traffic congestion
Vehicular cloud
vehicular network
vehicular networking
real-time systems
Metrics
cyber physical systems
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
home automation
Cloud Computing
vehicular ad hoc networks
Roads
mobile computing
sensors
security
traffic engineering computing
Fog computing
radiofrequency identification
transport protocols
automobiles
Urban areas
Internet of Vehicles
automated vehicular cloud computing
Cameras
cellular radio
Cloud Convolution
cloud virtual machine scalability
connected VCs
biblio
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
smart phones
IoV systems
Metrics
microcontrollers
mobile computing
mobile infrastructures
pubcrawl
Resiliency
security
sensors
IoV environment
stored evidence
strong adversarial scenario
threat model
traffic engineering computing
Trust-IoV
trustworthy evidence
trustworthy forensic investigation framework
vehicular ad hoc networks
dynamic mobile network system
Aggregates
Bluetooth
Cloud Computing
clouds
complex network system
cyber physical systems
Digital Forensics
digital forensics investigations
distributed infrastructure
Adversarial Scenario
Forensics
Human behavior
Human Factors
information sharing
Internet of Things
Internet of Things (IoT)
Internet of Vehicles
Internet of Vehicles (IoV)
biblio
Toward resilient networks with fog computing
Submitted by K_Hooper on Fri, 02/02/2018 - 11:07am
IoT
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
core network
delays
Disruption Tolerance
edge computing
edge networks
Fog computing
Future Internet
Internet of Things
toward resilient networks
IoT architecture
network resilience
network traffic
ns-3 network simulation
on-demand computing power
Open-Fog
pubcrawl
Resiliency
Resilient Security Architectures
security
Survivability
biblio
A framework for improving network resilience using SDN and fog nodes
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
resilience
long-term storage
Mininet network simulator
network communication
network resilience
network security
network traffic
OpenFlow
OpenFog
pubcrawl
local decision-making elements
Resiliency
Resilient Security Architectures
SDN
security
software defined networking
software-defined networking
Survivability
Switches
telecommunication traffic
Fog computing
Secrets
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
computer network security
decentralise computing
edge computing
edge network
edge detection
fog nodes
Future Internet
Internet of Things
Intrusion Detection
IoT
IoT traffic
IP networks
IP spoofing
IP spoofing security application
biblio
A Scattering Technique for Protecting Cryptographic Keys in the Cloud
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
cryptographic keys protection
on-demand computing
Memory Protection
key-scattering approach
key extraction tools
encryption
encrypted data
Data Analytics
data analysis
private key cryptography
Cloud Security
Cloud Computing
business critical-data
brute force attacks
Big Data
AES cryptographic keys
advanced encryption standard
scattering technique
VMs
VM random access memory
virtual machines
untrusted cloud providers
storage capabilities
standards
standard AES algorithm
Secure Cryptographic Keys
widely used computing paradigm
Scattering
Resilient Security Architectures
Resiliency
random-access storage
Random access memory
RAM
pubcrawl
biblio
Architecture for Resource-Aware VMI-based Cloud Malware Analysis
Submitted by grigby1 on Tue, 01/23/2018 - 3:52pm
Cloud Computing
Dynamic Malware Analysis
Human behavior
machine learning
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
virtual machine introspection
biblio
A policy-based identity management schema for managing accesses in clouds
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Access Control
authentication
Cloud Computing
Computational modeling
Identity management
Policy
Policy Mapping
pubcrawl
Reliability
Scalability
scalable
Scalable Security
security
Servers
user authentication
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Mobile Cloud middleware
web services
Web service governance
security of data
security criteria regulation middleware
security criteria regulation
security
pubcrawl
policy-based governance
Policy Based Governance
Policy
PGP
PDP
Organizations
multicloud tenancies
asset consumer security profiles
middleware
ESB-integrated middleware
cumbersome policy files
computing power
computing functionality
computer architecture
component
complex composite service
colosum scaling property
collaboration
Cloud Computing
attribute-based security policy model
attribute-based security policy
biblio
Construction of bulk power grid security defense system under the background of AC/DC hybrid EHV transmission system and new energy
Submitted by grigby1 on Tue, 01/23/2018 - 3:07pm
power grids
Voltage control
Three Defense Lines
Thermal stability
Security Defense System
security
Resiliency
pubcrawl
power system stability
Big Data
Operating systems security
Metrics
energy resources
EHV AC/DC hybrid power system
composability
Cloud Computing
Bulk Power Grid
« first
‹ previous
…
94
95
96
97
98
99
100
101
102
…
next ›
last »