Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource management
biblio
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
machine learning
Autonomic Security
secure resources
Power and Performance Management
on-demand computing capabilities
cloud computing systems
Big Data Analytics
autonomic resource management
Power demand
power consumption
High performance computing
security of data
tools
resource management
composability
pubcrawl
Resiliency
embedded systems
security
Hardware
Cloud Computing
Monitoring
biblio
Reusable intellectual property core protection for both buyer and seller
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
intellectual property
seller watermark
scheduling phase
reusable intellectual property core protection
register allocation phase
latency overhead
IP seller
IP core protection
IP core design
design cost overhead
Consumer electronics
CE devices
buyer fingerprint
architectural synthesis process
ip protection
Watermarking
logic circuits
resource management
Metrics
Fingerprint recognition
Registers
composability
embedded systems
microprocessor chips
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
IP networks
logic design
biblio
Per-File Secure Deletion for Flash-Based Solid State Drives
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
Per-file
SSD
solid state drives
Solid State Drive
Security-TRIM command
secure deletion
Scalability
resource management
real-time systems
pubcrawl
PSD-MLC scheme
programming crosstalk
programming
privacy
Per-File Secure Deletion scheme
Crosstalk
nonreal-time secure deletion
MultiLevel Cell flash memory
Media
invalid flash pages
Invalid Data Block
Hardware
GUID
globally unique identifier
flash-based solid state drives
flash memories
flash media
File update operations
data deletion
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
pubcrawl
tactical risk
Software Vulnerability
software fault tolerance
Servers
security of data
security
Safety
risk management
risk analysis
resource management
Resiliency
resilience
random system faults
CPS resilience
optimal cyber defense remediation
operational technology
Operational Resilience
operational impact assessment
information technology
graph theory
fault graph-based model
Erbium
data-driven attack graph
Damage Assessment
cyber-physical systems
cyber threats
cyber physical systems
biblio
Resource Allocation for Threat Defense in Cyber-security IoT system
Submitted by grigby1 on Fri, 06/26/2020 - 1:19pm
IoT
Dynamical Systems
threat defense
resource allocation problem
optimal control variables
open loop solution
game theory
feedback solution
Dynamic scheduling
dynamic game
cyber-security IoT system
cyber-physical systems
Games
Internet of Things
Resiliency
Metrics
composability
pubcrawl
optimisation
Wireless communication
resource management
resource allocation
Mathematical model
security of data
security
biblio
Dynamic Data Publishing with Differential Privacy via Reinforcement Learning
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
differential privacy
privacy guarantee
privacy budget allocation scheme
privacy budget allocation phase
privacy budget
dynamic data publishing strategy
dynamic data publishing algorithm
dynamic data
data release
data publishing
Publishing
privacy protection
Scalability
Heuristic algorithms
resource allocation
Reinforcement learning
resource management
privacy
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
data privacy
biblio
Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
PSO algorithms
Nature Inspired
metaheuristic algorithms
key organization
key allocation
homomorphic encryption approach
homomorphic encoding scheme
homomorphic algorithm
Homomorphic
encoding technique
encoding procedure
cloud data
resource utilization
homomorphic encryption scheme
Cloud Computing
encoding
Human Factors
cloud server
key management
particle swarm optimization
particle swarm optimisation
Metrics
resource management
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
software defined networking
Mobile Edge Computing
Network reconnaissance
network resource allocation
pubcrawl
realistic tactical scenarios
resource allocation
resource management
SDN architecture
short message service
mobile computing
software-defined radio networking
Tactical cloudlets
tactical environments
tactical SMS
tactical traffic flow
telecommunication traffic
trusted tactical cloudlets
trusted third-part authority
unmanned vehicle patrol deployment
distributed SDN-based C4ISR communications
centralized SDN controller
Cloud Computing
computerized-command-control-communications-intelligence- surveillance reconnaissance infrastructure
decentralized cloudlets layer
decentralized MEC layer
Delay-Tolerant Network
delays
distributed cloudlets
distributed SDN
C4ISR
end-to-end delay
generation military environment
high bite rate ISR
Information systems
intelligence-surveillance-reconnaissance video
MEC
military communication
military computing
biblio
Designing Security-Aware Service Requests for NFV-Enabled Networks
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
service function chains
Resiliency
resource allocation
resource allocation problem
resource management
security
security aspects
security of data
security requirements
security-aware service request design
resilience
software images
specialized hardware appliances
Substrates
supported service
Switches
virtualisation
Virtualization
virtualization privacy
load-balancers
best practices
Cloud Computing
cloud-based applications
composability
Hardware
high-volume servers
Human behavior
Human Factors
initial SFC requests
Bandwidth
Metrics
network function virtualization
network functions
network service request
NFV environment
NFV-enabled networks
privacy
pubcrawl
biblio
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
BitTorrent
peer to peer security
resource management
peer-to-peer networks
P2P protocol
network infrastructure
Leecher-to-Leecher transactions
incentive-based security model
incentive security model
incentive methods
Gnutella
fairness
computer network security
Network
Human Factors
Scalability
Metrics
Peer-to-peer computing
Protocols
pubcrawl
Resiliency
computer network management
security
Cryptography
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »