Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource management
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
biblio
Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process Using Support Vector Machines and Latent Dirichlet Allocation
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
security controls
machine learning algorithms
malicious proxy servers
malware
Metrics
nontraditional information sources
privacy
pubcrawl
resource management
machine learning
Support vector machines
SVM
text classification
threat vectors
topic modeling
two-stage hybrid process
Vocabulary
AV detection
learning (artificial intelligence)
leaked credentials
LDA
latent Dirichlet allocation
internet
hybrid machine learning model
hacker forums
hacker forum posts
cyber threat landscape
Cyber Threat Intelligence (CTI)
cyber threat intelligence
cyber security
CTI
Computer hacking
Computer crime
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
peer–
trusted nodes
to–
sybil nodes
sybil defense scheme
sybil attacks
Sybil attack
Social network services
simulation
Servers
resource management
radio frequency allocation incensing
pubcrawl
proactive
peer to peer security
peer-to-peer network overlays
Peer-to-peer computing
peer
p2p
overlay networks
Metrics
malicious data
logically connected hosts
Licenses
data availability
computer network security
composability
component
biblio
Modelling and evaluating failures in human-robot teaming using simulation
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
resource management
Work Models that Compute
work factor metrics
Teamwork
team working
team performance
team designers
Task Analysis
space EVA operations
Scalability
robots
robotic capabilities
robot failures
aerospace robotics
Resiliency
resilience
pubcrawl
multi-robot systems
human-robot teams
human-robot teaming
human-robot interaction
fault tolerance
failure evaluation
Extraterrestrial measurements
computational simulation
Computational modeling
biblio
A Trace-Based Performance Study of Autoscaling Workloads of Workflows in Datacenters
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
resources
operational behavior
provisioning policies
pubcrawl
real world traces
resilience
Resiliency
resource allocation
resource management
Monitoring
Scalability
scheduling
simulation
Task Analysis
time related autoscaling complexity metrics
trace based simulation
work factor metrics
allocation policies
memory related autoscaling complexity metrics
Measurement
Human Factors
elasticity metrics
datacenters
datacenter operators
Data models
customer experience
computer centres
computational complexity
Cloud Computing
autoscaling
autoscaler
application domains
Analytical models
biblio
Shortfall-Based Optimal Security Provisioning for Internet of Things
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
Resiliency
telecommunication network topology
Stochastic Computing Security
Stochastic computing
stochastic allocation
shortfall-based optimal security provisioning
security resource allocation plan
security infrastructure
security
Scalability
risk minimization
risk measure
risk management
resource management
resource allocation
computer network security
resilience
pubcrawl
Pareto optimization
optimization problem
optimization
optimisation
network security
Investment
Internet-of-Things scenarios
Internet of Things
Electronic mail
Economics
continuous topology changes
biblio
Full-duplex relay for enhancing physical layer security in Wireless Sensor Networks: Optimal power allocation for minimizing secrecy outage probability
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
pubcrawl
composability
physical layer security
Physical layer
Relays
artificial noise
resilience
resource management
power system reliability
probability
receiving antennas
secrecy outage probability
Metrics
MIMO communication
Resiliency
optimal power allocation
biblio
Research on an Agent-Based Intelligent Social Tagging Recommendation System
Submitted by grigby1 on Wed, 05/30/2018 - 4:11pm
personalized recommendation
user interest mining
tagging
social tagging users
social tagging recommendation
social networking (online)
Social Agents
Servers
self-adaptive recommendation strategy
self-adaptive recommendation
Scalability
resource management
recommender systems
pubcrawl
personalized recommendation strategy
Adaptation models
multi-agent systems
intelligent social tagging recommendation system
information retrieval
Human Factors
Human behavior
Filtering
equilibrium selection
Data models
Data mining
computer architecture
common preference group recommendation strategy
common preference group recommendation
Agent technology
biblio
Using model-based simulation for augmenting Incident Command System for disaster response
Submitted by el_wehby on Tue, 05/15/2018 - 11:56pm
incident command system
sensor data
resource management
recovery operations
Planning
organizational model
national incident management system
model-based simulation
Integrated circuit modeling
information integration agent
Adaptation models
Hazardous materials
emergency services
emergency management
disaster response management
Decision support systems
decision makers
Crisis Management
Computational modeling
communications management
1528550
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »