Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource allocation
biblio
DDoS Attack Mitigation through Root-DNS Server: A Case Study
Submitted by grigby1 on Fri, 04/03/2020 - 11:19am
Predictive models
true positive rate metric
traffic routing algorithms
telecommunication traffic
Support vector machines
Servers
Routing protocols
root-DNS server
root dns
RIPE Atlas
resource allocation
Random Forest
quality of service
pubcrawl
Probes
predictive security metrics
anycast
Metrics
machine learning
logistic regression
Load management
load balancing
k-nearest neighbors
IP networks
IP anycast
high availability
domain name system
DDoS attack mitigation
DDoS
cyber security
computer network security
Computer crime
biblio
Efficient Group Data Sharing In Cloud Environment Using Honey Encryption
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
group data sharing
Secure File Sharing
resilience
Resiliency
pubcrawl
standards
security
resource sharing
information sharing
honey encryption
Group Manager
Ciphers
efficiency
cloud environment
advanced encryption standard
cloud
resource allocation
Servers
Cloud Computing
encryption
Cryptography
biblio
Complex Network Cybersecurity Monitoring Method
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
resource management
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Task Analysis
system monitoring
special-purpose devices
security sensor
security of data
resource allocation
limited resource allocation
cybersecurity monitoring
complex networks
complex network unit cybersecurity
complex network cybersecurity monitoring
complex network
Bipartite graph
computer security
Scalability
Monitoring
sensors
biblio
SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud
Submitted by grigby1 on Mon, 03/09/2020 - 12:26pm
Cloud Security
load balance
CRRVA
covert channel attacks
co-resident-resistant VM allocation
co-resident threat mitigation
co-resident threat defense solution
co-resident attacks
CloudSim
migration cost
Cloud Computing
attack-aware VM reallocation
analytic hierarchy process-based threat score mechanism
analytic hierarchy process
allocation co-resident threat
AHPTSM
AAVR
security threat
VM pairs
VM migration
VM allocation policy
virtual machines
virtual machine security
threat score distribution
SVMDF
side channel attacks
VM threat score mechanism
security of data
secure virtual machine deployment framework
runtime co-resident security
resource interference attacks
resource allocation
pubcrawl
power consumption
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
RSSI Sequence and Vehicle Driving Matrix Based Sybil Nodes Detection in VANET
Submitted by grigby1 on Mon, 03/02/2020 - 12:38pm
resource allocation mechanisms
vehicular ad hoc networks
vehicle driving matrix - RSDM
VANET infrastructure
VANET
telecommunication security
sybil nodes detection
sybil attacks
Sybil attack
serious damages
RSSI sequence
composability
resource allocation
Resiliency
resilience
reputation models
pubcrawl
Protocols
neighbor nodes
Metrics
driving matrix
detection method
biblio
Secure Staging System for Highly Confidential Data Built on Reconfigurable Computing Platform
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
lower-than-IP-layer partitioning mechanisms
computer center
container
Dentistry
dynamic reconfigurability
Dynamic scheduling
Ethernet
field trial system
high performance data analytics
highly confidential data
common vulnerability scoring system evaluation
PCI Express
Provisioning Partitioning
reconfigurable computing platform
secure data
secure staging system
Security Scheduling
software defined
Ubiquitous Computing Security
computer security
computer network security
Cloud Computing
Scalability
Software
Resiliency
pubcrawl
Metrics
resource allocation
security of data
data analysis
Containers
OpenFlow
Human Factors
Reconfigurability
High performance computing
hospitals
reconfigurable architectures
biblio
Will Blockchain Technology Become a Reality in Sensor Networks?
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
telecommunication network routing
sensor networks
security features
resource-constrained wireless sensor network
private communication blockchain framework
memory storage
load balancing multihop routing shares
LBMH routing shares
control overhead reduction
constant bit rate
computation power
cluster heads
cluster head
battery life
blockchain technology
sensor security
telecommunication security
resource allocation
blockchain
Metrics
Computational modeling
sensor nodes
Peer-to-peer computing
Routing
wireless sensor networks
batteries
composability
pubcrawl
Human behavior
Resiliency
security
biblio
Security Embedded Offloading Requirements for IoT-Fog Paradigm
Submitted by aekwall on Mon, 01/20/2020 - 10:53am
IoT-Fog based systems
Task Offloading
security provision
security embedded task offloading requirements
security embedded offloading requirements
Scalability
resource allocation
Resiliency
pubcrawl
propagation latencies
offloading security
middleware technologies
middleware
Middle-ware
IoT-Fog paradigm
Cloud Computing
IoT-Fog based future communication networks
Internet of Things (IoT)
Internet of Things
internet
information processing
future smart networks
Fog Computing and Security
Fog computing
embedded security requirements
edge computing
delay tolerant networks
Data protection
data management
computer network security
biblio
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
mobile computing
generation IoT-based services
greedy algorithm
greedy algorithms
integer programming
Internet of Things
IoT
IoT applications
location awareness
mixed integer nonlinear optimisation
FogAtlas
nonlinear programming
optimization
placement
pubcrawl
raw data transfers
Resiliency
resource allocation
Scalability
delays
Bandwidth
central cloud
Cloud Computing
cloud computing technology
cloud module
communication demands
Computation offloading
Containers
app-aware placement
dynamic computation
edge computing
edge devices
fog application
Fog computing
Fog Computing and Security
fog computing platform
fog module
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »