Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Performance
biblio
Quantifying Security and Performance of Physical Unclonable Functions
Submitted by grigby1 on Tue, 04/27/2021 - 3:00pm
Cryptography
Entropy
Hardware
Hashing Function
Integrated circuit modeling
Measurement
Metrics
Object recognition
Performance
Physical Unclonable Function
Physical Uncloneable Function
pubcrawl
security
Security Metrics
similarity
tools
file
Performance improvement of anomaly detection on IoT network
Submitted by akarns on Fri, 03/12/2021 - 2:54pm. Contributors:
Latha Suryavanshi Karakos
Jumoke Ladeji-Osias
ABSTRACT
Decision Tree
Internet of Things
Intrusion Detection
IoT
IoTID20
Performance
Presentations
biblio
Trust Repair in Performance, Process, and Purpose Factors of Human-Robot Trust
Submitted by grigby1 on Wed, 02/03/2021 - 12:43pm
purpose
visual perception
trustworthiness perceptions
trust violations
trust violation
Trust Repair
trust
Task Analysis
subsequent trust behaviors
Service robots
Robot Trust
Resiliency
resilience
purpose perceptions
purpose factors
automation
pubcrawl
process
Performance
partner performance perceptions
organisational aspects
maintenance engineering
Investment
human-robot ttust
human-robot interaction
human-robot
Human Factors
Human behavior
HRI
distrust behaviors
biblio
BBS: Micro-Architecture Benchmarking Blockchain Systems through Machine Learning and Fuzzy Set
Submitted by aekwall on Mon, 01/18/2021 - 10:27am
fuzzy set theory
Fuzzy Cryptography
Workload Characterization
microarchitecture benchmarking blockchain systems
micro architecture
irreversibility
Caliper
Blockbench
Benchmarking
BBS
decentralization
Fabrics
Traceability
Benchmark testing
Software Architecture
Scalability
Measurement
Distributed databases
Performance
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Protocols
Cryptography
biblio
Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
Submitted by grigby1 on Thu, 08/13/2020 - 4:34pm
Multiplexing
transport protocols
transport design
Tor transport layer
Tor anonymity network
Tor
QUIC protocol
QUIC
Performance
onion routers
head-of-line blocking problem
handshaking delays
Google protocol
empirical performance evaluation
Anonymity Network
sockets
security
Relays
anonymity
Metrics
public domain software
Kernel
delays
composability
Protocols
internet
data privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
attribute certificate
collaboration
updating distributing keys
role-based access control
RBAC
Performance
key update
existing CP-ABE based schemes
efficient key update function
efficient data Access Control
data outsourcing environment
CP-ABE policy
Ciphertext Policy - Attribute-based Encryption
Attribute certificate management
Cryptography
access request
access control model
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Access Control
CP-ABE
policy-based governance
pubcrawl
Conferences
Scalability
outsourcing
Cloud Computing
authorisation
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
Performance, Reliability and Scalability for IoT
Submitted by grigby1 on Mon, 02/17/2020 - 4:05pm
machine learning
telecommunication network reliability
software platforms
security scalability
Scalability
robotics
risks evaluation
Reliability and Scalability
QoS for IoT
pubcrawl
Performance
5G
IoT-solutions
IoT support
Internet of Things
Industry 4.0
cooperative intrusion detection
computer network security
Compositionality
Cloud and Fog
Big Data Analytics
Big Data
biblio
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN
Submitted by grigby1 on Tue, 01/21/2020 - 10:27am
NFV
virtualisation
TOSCA standard
Topology
standards
software defined networking
security
SDN
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance
Peer-to-peer computing
orchestration
commodity hardware
network operators
network function virtualization
NDN-related security
NDN virtual network
NDN
named data networking
MANO
internet
information-centric networking paradigm
Information Centric Networks
Information Centric Network
content-oriented orchestration
computer network security
computer architecture
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
Resiliency
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Multicore processing
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
full disk encryption
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
commodity multicore processors
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
« first
‹ previous
1
2
3
4
5
next ›
last »