Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource management
biblio
Secure power scheduling auction for smart grids using homomorphic encryption
Submitted by grigby1 on Wed, 02/21/2018 - 1:54pm
encryption
Homomorphic encryption
Human behavior
Human Factors
paillier cryptosystem
Power Scheduling Auction
pubcrawl
resilience
Resiliency
resource management
Scalability
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
biblio
A Data Streaming Approach to Link Mining in Criminal Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:45pm
security
pattern discovery
potential links
pubcrawl
public administration
real-time systems
Resiliency
resource management
Scalability
Metrics
similarity social network metrics
Social network services
social networking (online)
social networks
social networks analysis
stream processing approach
time-sensible scenarios
Apache Flink framework
Measurement
link mining
law enforcement agencies
Indexes
flexible data stream processing application
evolving criminal network
data streaming approach
data stream processing
Data mining
criminal networks
criminal link detection
criminal law
criminal actions
big data security metrics
Big Data Analytics
biblio
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
Scalability
information-centric cloud network security
network virtualization
networking aspects
performance requirements
provision network resources
pubcrawl
resource management
Routing
information centric services
SDN-based framework
security
software assurance
software defined networking
software-defined networking
virtual networks
virtualisation
Virtualization
computer centres
Cloud Computing
cloud data centers
cloud infrastructure
cloud network resources
cloud provider
cloud services
cloud user
composability
cloud applications
computer network performance evaluation
computer network security
delays
fully distributed data plane
information centric cloud framework
Information Centric Cloud Networking
information centric networking
biblio
FlowSNAC: Improving FlowNAC with Secure Scaling and Resiliency
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
VNF services
secure scaling
Secure State Migration
process control
secure state transfer
security
service degradation
Load management
product life cycle management
pubcrawl
Resiliency
Monitoring
software defined networking
stateless components
traffic steering
FlowNAC
FlowSNAC
Resilient Security Architectures
resource allocation
resource allocations
resource management
life-cycle management
network function virtualization
NFV
orchestration systems
SDN
SDN/NFV management
authentication
Degradation
biblio
Resource allocation based on clustering algorithm for hybrid device-to-device networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Algorithm design and analysis
clustering algorithm
Clustering algorithms
D2D communication
Device-to-device communication
Information Reuse
Interference
Manganese
pubcrawl
Resiliency
resource allocation
resource management
security
Signal to noise ratio
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
biblio
Balancing Data Security and Blocking Performance with Spectrum Randomization in Optical Networks
Submitted by grigby1 on Mon, 11/13/2017 - 11:55am
optical fibre networks
Time Frequency Analysis
telecommunication security
spectrum randomization
spectrum fragmentation
spectrum allocation proactive randomization
security
Scalability
RP arrival rate
resource management
Resiliency
randomization process arrival rate
random-fit spectrum allocation method
random reallocation fragment
Radio frequency
pubcrawl
Analytical models
Optical fiber networks
on-demand defragmentation scheme
occupancy pattern model
multiclass continuous-time Markov chain
Metrics
Markov processes
EOL
elastic optical networks
elastic optical link
data security improvement
data security balancing
data randomization
Data models
CTMC
connection security
biblio
Ports Distribution Management for Privacy Protection Inside Local Domain Name System
Submitted by K_Hooper on Wed, 10/25/2017 - 11:57am
domain name system
ports distribution
privacy protection
pubcrawl
resilience
resource management
Scalability
Security by Default
biblio
OS-based Resource Accounting for Asynchronous Resource Use in Mobile Systems
Submitted by grigby1 on Tue, 09/05/2017 - 1:43pm
composability
embedded systems
Metrics
network accountability
operating systems
Power management
pubcrawl
Resiliency
resource management
biblio
Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications
Submitted by grigby1 on Mon, 04/03/2017 - 11:52am
composability
Control applications
Cyber Dependencies
Damage Assessment
Intrusion Detection
intrusion mitigation
Metrics
network intrusion detection
Physical layer
physical layer security
physical-layer security
pubcrawl
Resiliency
resource management
Security of cyber-physical systems
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »