Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource isolation
biblio
A Resource Management Model for Real-time Edge System of Multiple Robots
Submitted by grigby1 on Thu, 12/17/2020 - 1:54pm
resource security access control
policy-based governance
pubcrawl
real-time edge system
resilience
Resiliency
resource access control
resource allocation
resource isolation
operating systems (computers)
resource security isolation protection
robot hardware modules
Robot Operating System
robot operating systems
security
security of data
software modules
telecommunication security
isolation model
day industrial productions
edge computing
fault detection
fault location
hierarchical management
Human behavior
Human Factors
industrial robots
authorisation
light-weight edge devices
lightweight edge device
mission-critical resource classification
multi-robot systems
multilevel security data isolation transmission
multiple robot arms
multiple robots
novel resource management model
biblio
SENAD: Securing Network Application Deployment in Software Defined Networks
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
network programmability
app-to-control threats
application plane controller
Computer crashes
data plane controller
DPC
dubbed SENAD
malicious command injection
network application deployment
APC
OpenFlow entries
resource exhaustion attack
resource isolation
SDN architecture
Software Defined Networks
telecommunication control
telecommunication network management
Resiliency
Access Control
authorisation
authorization
Runtime
Software
computer architecture
computer network management
software defined networking
computer network security
pubcrawl
composability
Metrics
SDN controller
process control
network management
command injection attacks