Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer systems
biblio
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
Software
Scalability
security breaches
Security Evaluation
security of data
security patch
security patch management
security threats
Servers
push-type patch management
software assurance
software vulnerabilities
stochastic reward net
system security
virtual machine
virtual machine based intrusion tolerant system
virtual machines
VM-based intrusion-tolerant system
intrusion tolerance
attack behavior
composability
composite stochastic reward net model
Computational modeling
computer security
computer systems
defense behaviors
interval availability
Resiliency
malicious attack
Markov processes
Markov regenerative process
periodic vulnerability checking strategy
phase expansion
point-wise availability
pubcrawl
pull-type patch management
biblio
The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
multiplication
Task Analysis
subtraction
Scalability
Resiliency
residual classes
residual class system
Redundancy
pubcrawl
positive number
number theory
no-fault operations
negative number
natural redundancy
natural number
addition
Mathematical model
integer arithmetic operations
exponentiation
digital arithmetic
Data processing
data compression
Conferences
computer systems and components
computer systems
Complexity theory
artificial redundancy
arithmetic operations
arbitrary power
biblio
A Botnet Detection Approach Based on the Clonal Selection Algorithm
Submitted by grigby1 on Fri, 04/05/2019 - 9:24am
HTTP botnet detection
transport protocols
Training
telecommunication traffic
Resiliency
resilience
pubcrawl
Peer-to-peer computing
P2P botnet detection
Metrics
malware
IRC botnet detection
IP networks
invasive software
Immune system
hypermedia
artificial immune system
DNS botnet detection
corporate area networks
computer systems
computer network security
Computer crime
Compositionality
clonal selection algorithm
Classification algorithms
botnets
Botnet detection
botnet
BotGRABBER system
benign network traffic
artificial immune systems
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 12:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
Optimizing Task Assignment with Minimum Cost on Heterogeneous Embedded Multicore Systems Considering Time Constraint
Submitted by grigby1 on Wed, 02/21/2018 - 12:37pm
Processor scheduling
Guaranteed Probability
Heterogeneous Embedded Multicore System
heterogeneous embedded multicore systems
heterogeneous multicore architectures
minimum cost
multiprocessing systems
optimal energy efficiency
optimizing task heterogeneous assignment with probability algorithm
OTHAP
processor and voltage assignment with probability problem
execution time
processor scheduling algorithm
PVAP problem
real-time embedded systems
system performance model
Task Assignment
task assignment optimization
task completion probability
time constraint
multicore computing security
Multicore Computing
Program processors
pubcrawl
Scalability
Algorithm design and analysis
energy consumption
real-time systems
Reliability
directed graphs
probability
Metrics
Signal processing algorithms
resilience
embedded systems
Resiliency
battery-based embedded systems
computer systems
DAG
data-dependent aperiodic tasks
directed acyclic graph
dynamic programming
dynamic programming algorithm
Energy Efficiency
biblio
"Advanced Persistent Threats - detection and defense"
Submitted by abfox on Tue, 02/14/2017 - 11:11am
Data protection
software IDS tools
Servers
security upgrades
security policies
pubcrawl170101
Organizations
Monitoring
malware
encryption
Access Control
Data mining
Cryptography
computer systems
command and control systems
authorisation
Attack vectors
Anomaly Detection
advanced persistent threats
biblio
A model for Human-computer trust: A key contribution for leveraging trustful interactions
Submitted by BrandonB on Thu, 04/30/2015 - 12:29pm
human computer interaction
user trust needs
user perceptions
trustful interaction leveraging
social phenomenon
psychology
participation history
Participation
Interaction design
human-computer trust model
Human-computer trust
human-computer iteration
collaboration
Engagement
Educational institutions
Correlation
Context
Computers
computer-mediated interactions
computer systems
computer science
computer mediated communication
Computational modeling
profile
Jose Monsalve Diaz
Certification
Communication
Embedded Software
Testing
Platforms
Systems Engineering
Resilient Systems
Robotics
Simulation
Validation and Verification
Education
compilers
computer systems
fault detection
Fault injection
Fault Resilience
Fault-Tolerance
Microprocessor
Runtime system
Delaware
« first
‹ previous
1
2