Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource allocation
biblio
Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters
Submitted by aekwall on Mon, 06/08/2020 - 11:26am
cybersecurity loss awareness
VM-to-VM cybersecurity interdependency risks
two-player zero-sum game
static VM allocation
resource utilization
public cloud clusters
operating expense
multidimensional bin packing approaches
mathematical programming approach
large-scale cloud data centers
game theoretic-based approaches
equilibrium allocation strategies
cybersecurity-aware virtual machine placement
cybersecurity-aware consolidation algorithms
security of data
mathematical programming
game theoretic security
game model
virtual machines
Predictive Metrics
Human Factors
resource allocation
Cybersecurity
pubcrawl
game theory
Scalability
Cloud Computing
biblio
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
Submitted by aekwall on Mon, 06/08/2020 - 11:25am
Infrastructure security
star topology
simultaneous game
Servers
security of data
security
Scalability
resource allocation
pubcrawl
Predictive Metrics
optical switches
Numerical models
Nash Equilibrium
interdependency levels
Interdependencies
Integrated optics
Attack Strategies
infrastructure resilience
infrastructure design
Human Factors
Games
game-theoretic defense strategy
game theory
game theoretic security
external attacks
defense effort
cyber-physical infrastructures
Cost accounting
constituent systems
bus structure
basic topological structures
biblio
Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
Submitted by grigby1 on Fri, 05/15/2020 - 12:01pm
resilience
time inference attacks
switches flow-table size
Software Defined Networks
software defined networking
Software Defined Network
Software
SDN security
SDN resource-consumption
SDN deployment
SDN controllers
SDN
Scalability
saturation attacks
resource allocation
Resiliency
Cloud Computing
Reconnaissance
pubcrawl
process control
Probes
Network reconnaissance
flow-table size
flow state reconnaissance
delays
data centers
countermeasure
computer network security
computer centres
Cloud Security
Cloud Datacenter
cloud data center testbed
biblio
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
software defined networking
Mobile Edge Computing
Network reconnaissance
network resource allocation
pubcrawl
realistic tactical scenarios
resource allocation
resource management
SDN architecture
short message service
mobile computing
software-defined radio networking
Tactical cloudlets
tactical environments
tactical SMS
tactical traffic flow
telecommunication traffic
trusted tactical cloudlets
trusted third-part authority
unmanned vehicle patrol deployment
distributed SDN-based C4ISR communications
centralized SDN controller
Cloud Computing
computerized-command-control-communications-intelligence- surveillance reconnaissance infrastructure
decentralized cloudlets layer
decentralized MEC layer
Delay-Tolerant Network
delays
distributed cloudlets
distributed SDN
C4ISR
end-to-end delay
generation military environment
high bite rate ISR
Information systems
intelligence-surveillance-reconnaissance video
MEC
military communication
military computing
biblio
An Intelligent Cyberspace Defense Architecture Based on Elastic Resource Infrastructure and Dynamic Container Orchestration
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
security event database
intelligent defense
Network Security Architecture
pubcrawl
Resiliency
resource allocation
security
security architecture
security capability pool
security decision center
intelligent cyberspace defense architecture
security load
security of data
security payload
security resource allocation
Software
top-level security framework
unprecedented hard situation
versatile cyberspace
containerization technology
Metrics
Dynamic Networks and Security
aggregated security events
Cloud Computing
cloud computing platform
computer architecture
container library
containerization
composability
Containers
Cyberspace
decision rule base
dynamic container orchestration
Dynamic decision making
Dynamical Systems
elastic resource infrastructure
Hardware
biblio
Designing Security-Aware Service Requests for NFV-Enabled Networks
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
service function chains
Resiliency
resource allocation
resource allocation problem
resource management
security
security aspects
security of data
security requirements
security-aware service request design
resilience
software images
specialized hardware appliances
Substrates
supported service
Switches
virtualisation
Virtualization
virtualization privacy
load-balancers
best practices
Cloud Computing
cloud-based applications
composability
Hardware
high-volume servers
Human behavior
Human Factors
initial SFC requests
Bandwidth
Metrics
network function virtualization
network functions
network service request
NFV environment
NFV-enabled networks
privacy
pubcrawl
biblio
HP-SDDAN: High-Performance Software-Defined Data Access Network
Submitted by grigby1 on Fri, 04/17/2020 - 10:29am
Software
Human Factors
IP networks
Metrics
privacy
programable network rules
pubcrawl
resilience
Resiliency
resource allocation
Human behavior
Software Defined Network
software defined networking
software-defined data access network architecture
software-defined network
storage management
storage resource allocation information
Virtualization
virtualization privacy
data privacy
attribute-based data access control
authorisation
Cloud Computing
cloud environments
cloud platform
composability
data access network
data attributes
Access Control
Data protection
Data Security
differential privacy
Firewalls (computing)
global network management capabilities
global user information
high-performance software-defined data access network
HP-SDDAN implementation
biblio
Enabling Adaptive Deep Neural Networks for Video Surveillance in Distributed Edge Clouds
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
video surveillance
two-stage delay-aware graph searching approach
task scheduling
remote clouds
network delay
network cameras
intelligent video surveillance task scheduling problem
input video segment
feature similarity
distributed edge clouds
computing delay
adaptive DNN model selection method
adaptive deep neural networks
NP-hard
Computation offloading
deep neural networks
Cloud Computing
scheduling
edge computing
video signal processing
image segmentation
computational complexity
resource allocation
neural nets
Metrics
graph theory
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
multicarrier NOMA systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
Communication Systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
optimisation
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
game theory
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
biblio
Dynamically Reconfigurable Slice Allocation and Admission Control within 5G Wireless Networks
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Radio Access Network
integrated user application-specific demand characteristics
intra-slice resource sharing elasticity
massive machine type communication
network characteristics evaluation
network load
network utility
online slice allocation model
quality of experience
heterogeneous traffic demand
resource allocation decision metric
resource allocation framework performance
resource management
service demand
slice resource block-size
ultra-reliable low-latency communication
predictive security metrics
Internet of Things
estimation theory
enhanced mobile broadband
Dynamic scheduling
dynamic intra-slice decision boundary estimation model
Bandwidth
admission control strategy
Admission control
5G wireless network
resource allocation
Metrics
telecommunication congestion control
telecommunication traffic
quality of service
5G mobile communication
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »