Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Reducing Processing Delay and Node Load Using Push-Based Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
information-centric networking
specific content
returns data
push-type communication method
push-based information-centric networking
pull-type communication method
packet processing delay time
node load
contents deliver
content distribution method
faces
edge node
Information Centric Networks
named data networking
Scalability
ICN
delays
Load modeling
Routing protocols
network traffic
telecommunication network routing
Distributed databases
internet
Routing
pubcrawl
Resiliency
telecommunication traffic
Servers
biblio
Adaptive Caching for Beneficial Content Distribution in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
in-network caching
utility-based replacement
request arrival rate
next-generation networking
network design
in-network caching mechanism
ICN interconnections
Future Internet (FI)
content-based providers
cache diversity
beneficial content distribution
beneficial caching scheme
adaptive caching mechanism
cache hit rate
content distribution
Information-Centric Networking (ICN)
IP networks
Information Centric Networks
information-centric networking
QoS
Proposals
quality of service
network topology
service providers
Economics
internet
pubcrawl
Resiliency
data traffic
security
telecommunication traffic
Scalability
biblio
GDGCA: A Gene Driven Cache Scheduling Algorithm in Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
information distribution scheduling algorithm
data popularity
Distributed cache scheduling
future network architecture
GDGCA
gene driven cache scheduling algorithm
gene driven greedy caching algorithm
ICN edge router
ICN environment
ICN scenario
information centered concept
content cache replacement
information epilepsy
Information Gene
information gene value
information-centric network
optimal simulation model
Poisson data volumes
QoE index
satisfaction degree
self-caching network
user-centered concept
information entropy
Data models
Resiliency
pubcrawl
simulation
internet
resource allocation
telecommunication network routing
Throughput
ICN
Information Centric Networks
Scalability
scheduling
greedy algorithms
Stochastic processes
cache storage
Scheduling algorithms
telecommunication scheduling
information-centric networking
Accurate Poisson stream
cache capacity
Content analysis
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
An Information-centric NFV-based System Implementation for Disaster Management Services
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
mobile rescue operations
disaster recovery phase
flexible rescue group communication
ICN
information centric disaster management
information-centric disaster management system
information-centric network management
information-centric NFV-based system implementation
IP-based approach
low communication overhead
Disaster management
name-based interest-oriented communication approach
ndn nfv
network fragmentation
network infrastructure management
Seoul disaster management services
system implementation
Telephony
vICSNF
law enforcement
Scalability
virtualisation
computer network management
Resiliency
pubcrawl
internet
network topology
Topology
IP networks
Information Centric Networks
network function virtualization
container
hospitals
Gold
emergency management
openstack
connection-oriented communication
biblio
Analysis of Content Availability at Network Failure in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
computer network reliability
random node removal
nodes reachability
node removal
network robustness
network failure
information-centric net-working (ICN)
host-centric networks
contents server
content availability
cluster-based node removal
caching contents
average content availability
cache storage
Scalability
Information Centric Networks
information-centric networking
telecommunication network topology
Measurement
Routing protocols
network topology
Mathematical model
Analytical models
internet
Robustness
pubcrawl
Resiliency
biblio
Testbed-based Performance Evaluation of the Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
ICN network
basic CCN architecture
caching
CCN
computer network performance evaluation
content delivery time
content transfer time
efficient network management
fast content delivery
ICN concept
content retrieval
Internet usage
multimedia applications
Multimedia systems
naming
performance requirements
testbed
testbed architecture
testbed-based performance evaluation
traffic load control
Load modeling
telecommunication traffic
security
performance evaluation
mobile computing
computer network management
Resiliency
pubcrawl
Routing
internet
Scalability
information and communication technology
ICN
information-centric networking
Information Centric Networks
Internet architecture
in-network caching
improved security
mobility support
biblio
Relating Factors of Tertiary Institution Students’ Cybersecurity Behavior
Submitted by grigby1 on Tue, 03/30/2021 - 12:03pm
Internet skills
validated cybersecurity factors
tertiary institutions students
tertiary institution students
SPSS version 25
security self-efficacy
security of data
security
response efficacy
pubcrawl
perceived vulnerability
perceived severity
perceived benefits
perceived barriers
peer behavior
computer skills
Internet exposure
internet
Human Factors
Human behavior
further education
cybersecurity training
cybersecurity issues
cybersecurity behaviors of tertiary institution students
cybersecurity behaviors
cybersecurity behavioral factors
Cybersecurity
cues to action
Correlation analysis
biblio
Assessing Information Risks When Using Web Applications Using Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
pubcrawl
Web application vulnerability scanner
Web application
vulnerability assessment
security of data
security
risk analysis
Resiliency
resilience
Cyber Physical System
Metrics
internet
information risk concepts
information risk assessment
Information risk
Fuzzy logic
data protection discipline
biblio
DDoS Detection Algorithm Based on Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
Histograms
uncertainty
telecommunication traffic
service attacks
security
Resiliency
resilience
pubcrawl
nonattack traffic
Metrics
IP networks
IP
Intrusion Detection
Internet technologies
internet
Anomaly Detection
graphics-based features
graph based features
fuzzy relevance function
Fuzzy logic
fuzzy clustering
Entropy
detection stage
DDoS intrusion detection approach
DDoS detection algorithm
DDoS detection
Cyber Physical System
computer network security
Computer crime
attack traffic
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »