Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data centers
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
computer centres
System recovery
supervisory control
Spire
sophisticated network-level attacks
simultaneous intrusions
SCADA system management
power grid infrastructure
network-attack-resilient intrusion-tolerant SCADA
nation-state-level attackers
data acquisition systems
control centers
network attack
data centers
intrusion tolerance
Power Grid
security of data
resilience
power system reliability
fault tolerant computing
power grids
Substations
network attacks
composability
pubcrawl
Resiliency
SCADA systems
SCADA
Protocols
distributed processing
Monitoring
computer network security
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
biblio
Scalable DDoS Mitigation System
Submitted by aekwall on Mon, 06/29/2020 - 11:56am
detection
DDoS attack mitigation
protection
multitarget DDoS attacks
modular filtering system
filtration
DDoS mitigation system
DDoS attacks filtering
data center
data centers
tools
internet
Metrics
Computer crime
composability
pubcrawl
Human behavior
Resiliency
Hardware
Servers
IP networks
distributed denial of service attacks
Monitoring
DDoS
computer network security
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 11:01am
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
biblio
A Security Architecture Framework for Critical Infrastructure with Ring-based Nested Network Zones
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
architectural design
structural design
security architecture framework
security architecture
security architectural framework
secured information systems
ring-based nested network zones
Nested Zones
N-tier/shared nothing system architectures
defense-in-depth approach
defense in depth
data centers
critical infrastructure
Attack Hops
security of data
network architecture
Network Security Architecture
critical information infrastructure
Guidelines
security attributes
Information systems
Software Architecture
standards
pubcrawl
Resiliency
computer architecture
security
biblio
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels
Submitted by grigby1 on Tue, 02/18/2020 - 10:55am
single LRU cache
Nickel
optimal distributed LRU caching
Organizations
probability
reliability theory
reliable caches
resilience
Resiliency
resource management
Scalability
separate LRU caches
single-hop multicache distributed system
Mobile Edge Computing
storage management
symmetric channels
system design
System performance
total cache space
total memory space
unreliable channels
unreliable LRU caches
Web Caching
wired Web servers
wireless content delivery networks
data items
asymptotic miss probabilities
asymptotic miss probability
cache miss ratios
cache storage
channel unreliability probabilities
Communication Systems
counterintuitive characteristics
counterintuitive insights
critical method
data centers
Data-Intensive Applications
asymmetric cache organization
data placement
data replication schemes
data routing strategies
efficient cache organization
efficient data access
explicit unequal allocation policy
fast data access
fundamental method
Hash functions
LRU caching systems
Metrics
biblio
LevelTree: A New Scalable Data Center Networks Topology
Submitted by grigby1 on Mon, 12/16/2019 - 2:59pm
shortest path
LevelTree
network topology
new scalable data center network topology
pubcrawl
resilience
Resiliency
Scalability
Servers
Jellyfish
telecommunication network routing
telecommunication network topology
topological properties
Topology
tree topology
Vegetation
VolvoxDC
Data Center Network(DCN)
Bisection Bandwidth
cloud based applications
computer centres
computer networks
Control Theory
critical topologies
Cyber Physical System
cyber physical systems
Bandwidth
data centers
DCN topology
Diameter of graph
Fattree
graph theory
high bisection bandwidth
Human behavior
biblio
Service Oriented Resilience Strategy for Cloud Data Center
Submitted by grigby1 on Fri, 03/22/2019 - 12:01pm
Measurement
system resilience
Stochastic processes
service oriented resilience
Servers
Scalability
Resilience strategy
resilience metric
resilience
quality of service
pubcrawl
Petri nets
Metrics
Resilient Security Architectures
maintenance engineering
IT architecture
hierarchical colored generalized stochastic petri net
fault tolerance
data centers
computer networks
computer centres
cloud data center
Cloud Computing
big data security
Big Data
Resiliency
biblio
Challenges and Preparedness of SDN-based Firewalls
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
network manageability
Vulnerability Management
virtualization privacy
surveys and overviews
software defined networking
security and privacy
sdn based firewall
Resiliency
pubcrawl
privacy
OpenFlow protocol
OpenFlow
network security
Access Control
Metrics
Human behavior
header space analysis
flow control
firewalls
data plane
data centers
data center networks
control plane
Conflict Resolution
conflict detection
composability
« first
‹ previous
1
2
3
4
5
6
next ›
last »