Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Trust-Aware and Location-Based Collaborative Filtering for Web Service QoS Prediction
Submitted by grigby1 on Mon, 03/26/2018 - 11:55am
QoS
web services
Web Service
web of trust
Trusted Computing
trust-aware collaborative filtering
trust-aware
Resiliency
resilience
recommender systems
quality of service
QoS prediction
Cloud Computing
pubcrawl
Prediction algorithms
Mathematical model
location-based collaborative filtering
location
internet
geographical location
composability
collaborative filtering
collaboration
biblio
Impact of Replacement Policies on Static-Dynamic Query Results Cache in Web Search Engines
Submitted by grigby1 on Mon, 03/26/2018 - 11:54am
replacement policies
Web search engines
Web search engine companies
Web search engine
Web search
Web Caching
static-dynamic query
static-dynamic cache
search engines
SDC
Scalability
Resiliency
resilience
Algorithms
real large scale query logs
query results cache
query processing
pubcrawl
Metrics
law enforcement
internet
Engines
Companies
Clocks
caching query
cache system
biblio
Web Caching Evaluation from Wikipedia Request Statistics
Submitted by grigby1 on Mon, 03/26/2018 - 11:54am
Servers
Zipf distributed requests
wireless networks
Wikipedia request statistics
Wikipedia pages
Wikipedia daily top-1000 statistics
Wikipedia caches
Web sites
web caching strategies
Web caching evaluation
Web Caching
statistical analysis
simulation
access time reduction
Scalability
Resiliency
resilience
pubcrawl
Metrics
internet
hit rate
Encyclopedias
Electronic publishing
Conferences
cache storage
biblio
An Adversary-Centric Behavior Modeling of DDoS Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:58pm
industrial mitigation operation
Scalability
Resiliency
resilience
pubcrawl
Predictive models
Monitoring
Metrics
malware
internet
Adversary Models
Human behavior
feature extraction
distributed denial of service attack
DDoS attack model
Data-driven approach
computer network security
Computer crime
Analytical models
adversary-centric behavior model
biblio
Security Attacks on Information Centric Networking for Healthcare System
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
Medical services
wireless sensor networks
security of data
security framework
security attack
security
Resiliency
resilience
pubcrawl
Protocols
patient monitoring
patient health condition monitoring
Monitoring
Metrics
actuator security
medical information systems
IP networks
Internet of Things
internet
information centric networking
ICN
Human behavior
healthcare system
health care system
health care
e-healthcare monitoring service
composability
biomedical data communication security
biblio
A Secure PMIPv6-Based Group Mobility Scheme for 6L0WPAN Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
IP-based sensing devices
transport protocols
symmetric encryption method
Servers
secure PMIPv6-based group mobility scheme
Resiliency
resilience
pubcrawl
proxy mobile IPv6
Protocols
PMIPv6
personal area networks
mobility management (mobile radio)
low power wireless personal area networks
6L0WPAN
IoT
Internet Protocol version 6
Internet of Things
internet
Handover
Cyber Physical Systems Security
Cryptography
composability
authentication
6LoWPAN group handover scheme
6LoWPAN
6L0WPAN networks
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
intrusion protection system
software heterogeneity
Servers
security
Resiliency
resilience
pubcrawl
Protocols
Probes
personal area networks
network technology
network security
Network scans
network scan
IoT devices
IoT
6LoWPAN
Internet of Things
internet
interconnectivity
IEEE 802.15 Standard
IEEE 802.11 Standard
heterogeneous IoT networks
hardware heterogeneity
Fingerprinting
Cyber Physical Systems Security
computer network security
composability
complex security protocols
Bandwidth
active network measurements
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
Internet of Things: Raging Devices and Standardization in Low-Powered Protocols
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
low-powered protocols
Thread
The Thing
standardization
standard communication protocols
sensors
security
Resiliency
resilience
raging devices
pubcrawl
Protocols
OSI model
OSI
open systems
6LoWPAN
IP networks
IoT system architecture
IoT devices
IoT
Internet of Things
internet
IEEE 802.15.4
IEEE 802.15 Standard
data centers
Cyber Physical Systems Security
computer centres
composability
CoAP
Capacity planning
biblio
Authorship Attribution for Social Media Forensics
Submitted by grigby1 on Mon, 03/19/2018 - 12:38pm
social networking (online)
multimodal data processing
prepaid SIM cards
pubcrawl
public Wi-Fi hotspots
smart phones
Smartphones
social media
social media forensics
Metrics
Speech
stylometry
supervised learning-based
user anonymity
user identification
Writing
writing style
authorship attribution
Media
machine learning algorithms
machine learning
learning (artificial intelligence)
internet
Human behavior
habit peculiarities
Forensics
feature extraction
distributed networks
Digital Forensics
context exploitation
Context
computational linguistics
authorship attribution algorithm
« first
‹ previous
…
66
67
68
69
70
71
72
73
74
…
next ›
last »