Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
message exchange
Service robots
service robot
security
Scalability
RSA algorithm
Resiliency
public key cryptography
Public key
pubcrawl
message transmission
message integrity
cloud
message encryption
message decryption
message authentication
intelligent robots
encryption
digital signatures
digital signature algorithm
digital signature
control engineering computing
cloud intelligent robot
Cloud Computing
biblio
Study of security algorithms to secure IOT data in middleware
Submitted by aekwall on Mon, 06/01/2020 - 9:48am
middleware
security of data
security algorithms
Resiliency
resilience
pubcrawl
privacy
policy-based governance
middleware security
cloud
IoT data
IoT
Internet of Things
fog
data privacy
composability
Cloud System
Cloud Computing
biblio
Modeling Cloud Based Cyber Physical Systems Based on AADL
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
modeling languages
wireless sensor networks
vehicle
Unified modeling language
UML
Software Architecture
Software
security of data
Resiliency
resilience
quality of service
QoS
pubcrawl
object-oriented methods
object oriented security
Object oriented modeling
AADL
modeling
Metrics
Intelligent Transportation Systems
distributed sensors
distributed sensor networks
Data models
cyber-physical systems
CPS
Computational modeling
composability
cloud-based cyber-physical systems
cloud platforms
Cloud Computing
cloud
biblio
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
Resiliency
Korean e-government framework
Korean government agency
Linux
Metrics
military war game modeling
modeling and simulation
pubcrawl
resilience
infringement incident response tool
scenario based infringement incident response training
Secure Coding
virtualisation
virtualization-based infringement incident response tool
vulnerability measure practice
Window operating system environments
Windows Operating System Security
actual information system
government data processing
defense practice
cyber security training system
cyber security threats
cyber security experts
cyber security
computer science education
Computer crime
computer based training
composability
Cloud Computing
cloud
CBT type remote education
artificial intelligence technology
artificial intelligenc
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 9:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
Genoma: Distributed Provenance as a Service for IoT-based Systems
Submitted by aekwall on Mon, 03/30/2020 - 10:33am
cloud
provenance-as-a-service
Production facilities
IoT-based systems
genomics
Genoma
edge
distributed provenance
distributed IoT provenance
data processing substrate
Data processing
data management
Substrates
IoT
data provenance
Provenance
bioinformatics
Metrics
composability
pubcrawl
Human behavior
Resiliency
Data models
Internet of Things
Cloud Computing
biblio
Efficient Group Data Sharing In Cloud Environment Using Honey Encryption
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
group data sharing
Secure File Sharing
resilience
Resiliency
pubcrawl
standards
security
resource sharing
information sharing
honey encryption
Group Manager
Ciphers
efficiency
cloud environment
advanced encryption standard
cloud
resource allocation
Servers
Cloud Computing
encryption
Cryptography
biblio
SecureCSearch: Secure Searching in PDF Over Untrusted Cloud Servers
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
Keyword search
Secure File Sharing
resilience
Resiliency
pubcrawl
untrusted cloud servers
specific files
Shamir's Secret Sharing
Shamir Secret Sharing scheme
SecureCSearch
secure searching
Searching
Portable document format
PDF file
PDF
keyword search operations
Cryptography
information retrieval
incurs minimal computation cost
hacks
encrypted shares
encrypted PDF files
encrypted domain
encrypted cloud data
data leakage
cloud
data storage
storage management
Servers
Cloud Computing
security
encryption
biblio
ACT Testbot and 4S Quality Metrics in XAAS Framework
Submitted by grigby1 on Mon, 03/09/2020 - 1:38pm
software prototyping
metrics reports
program debugging
program testing
pubcrawl
regression testing
security
Security Metrics
security of data
security testing
service models
Software as a service
software metrics
software product
metrics dashboard
software quality
Software Testing
T-Model
test management tools
TestBot
testing
testing as a service
Testing process
testing tools
tools
XaaS (Everything as a Service)
XAAS framework
cloud
metrics testing
4S quality metrics
ACT TestBot tool
agile environment
agile methodology
Auto Bug Logging and Tracking
automated continuous testing
Automatic testing
automation scripts
big data security metrics
bug logging
bug reporting tools
Measurement
cloud based service models
Cloud Computing
Computer bugs
Continuous Delivery
continuous deployment
Continuous Integration
continuous integration tools
Continuous Testing
data analysis
data analytics tools
Measurement and Metrics Texting
Metrics
biblio
Determining the Effectiveness of Data Remanence Prevention in the AWS Cloud
Submitted by aekwall on Mon, 02/24/2020 - 9:53am
Amazon AWS cloud service
data remanence prevention
Data Remanence Detection
data remanence
cross-instance cloud remanence
cross-instance cloud data remanence
cloud virtual machine instances
cloud provider template
AWS
Cloud Computing
virtual machines
virtual machine
remanence
Compositionality
cloud
web services
pubcrawl
Resiliency
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »