Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource allocation
biblio
Shortfall-Based Optimal Security Provisioning for Internet of Things
Submitted by grigby1 on Thu, 06/07/2018 - 3:08pm
Resiliency
telecommunication network topology
Stochastic Computing Security
Stochastic computing
stochastic allocation
shortfall-based optimal security provisioning
security resource allocation plan
security infrastructure
security
Scalability
risk minimization
risk measure
risk management
resource management
resource allocation
computer network security
resilience
pubcrawl
Pareto optimization
optimization problem
optimization
optimisation
network security
Investment
Internet-of-Things scenarios
Internet of Things
Electronic mail
Economics
continuous topology changes
biblio
A security aware scheduling in fog computing by hyper heuristic algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
scheduling
Internet of Things
job scheduling
latency
Processor scheduling
pubcrawl
Resiliency
resource allocation
Scalability
integrity parameter
security
security aware scheduling
Security Heuristics
security of data
security overhead
sensor nodes
Task Analysis
data mining technique
authorisation
average energy consumption
Cloud Computing
computational overhead
confidentiality parameter
CPU utilization
data integrity
Data mining
authentication parameter
edge computing
Fog computing
fog devices
heterogeneous distributed environment
heuristic algorithm
Heuristic algorithms
hyper heuristic algorithm
biblio
Cloud Task Scheduling Based on Swarm Intelligence and Machine Learning
Submitted by K_Hooper on Wed, 05/02/2018 - 10:38am
Processor scheduling
machine learning algorithm
multicriteria decision
NP-complete problem
operations research
optimisation
optimization
parallel computing
particle swarm optimization
machine learning
pubcrawl
resource allocation
scheduling
scheduling technique
Swarm Intelligence
task makespan minimization
virtual machines
Ant colony optimization
Load management
load balancing scheduling
learning (artificial intelligence)
Honey Bee Optimization
execution time minimization
distributed computing
computational complexity
composability
CloudSim toolkit package
CloudSim
Cloud task scheduling
cloud environments
cloud environment
Cloud Computing
approximation techniques
biblio
A comparison of migration and multihoming support in IPv6 and XIA
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
quality of service
Mobility
mobility anchor point
mobility management (mobile radio)
multihomed hosts
multihoming
optimization
protocol messages
Protocols
pubcrawl
mobile radio
Resiliency
resource allocation
Routing
Routing protocols
telecommunication network routing
telecommunication security
wireless LAN
XIA
XIA Migration Protocol
IP networks
client mobility
collaboration
composability
computer network management
fault tolerance
flow migration support
flow-level migration
heavy-weight protocol
internet
allocative efficiency
IPv6 address
IPv6 multihoming solutions
ipv6 security
Metrics
Mobile communication
mobile computing
Mobile IPv6
Mobile IPv6 Enhanced Route Optimization
biblio
Verifying and Synthesizing Constant-Resource Implementations with Types
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
programs verification
type inference algorithm
timing channels
Syntactics
static analysis
standards
side channel attacks
Semantics
resource-aware noninterference
resource consumption
resource aware ML
resource analysis
resource allocation
pubcrawl
AARA
programming
program verification
language-based security
information flow tracking
Information Flow
inference mechanisms
encryption
Cryptography
constant-resource behavior implementations
Compositionality
cognition
automatic amortized resource analysis
biblio
Implementation and optimization of A5-1 algorithm on coarse-grained reconfigurable cryptographic logic array
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
resource allocation
Microelectronic Security
Noise measurement
performance optimization
pubcrawl
real-time requirements
reconfigurable architectures
resilience
Resiliency
Metrics
resource consumption
resource-based path seeking algorithm
RPS adaptive algorithm
shift registers
stream cipher
telecommunication security
Throughput
voice data encryption
coarse-grained reconfigurable cryptographic logic array
A5-1 algorithm optimization
Algorithm design and analysis
application specific integrated circuits
ASIC
bit rate 162.87 Mbit/s
cellular radio
CGRCA
Ciphers
A5-1
composability
Conferences
Cryptography
field programmable gate arrays
FPGA
frequency 162.87 MHz
GSM
biblio
Using computational game theory to guide verification and security in hardware designs
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Metrics
complex designs
composability
computational game theory
Computational modeling
Data protection
defender strategy
design network structure
embedded systems
formal methods
game theory
Games
Hardware
hardware validation
Hardware verification
Laboratories
verification costs
open-source synthesized hardware designs
optimal security deployment strategy
pubcrawl
Reliability
reliability threats
Resiliency
resource allocation
Safety
safety properties
security
security of data
Security Properties
Stackelberg security games model
system state space
valuable verification resource allocation
biblio
Enhancing security for load balanced energy enhanced clustered bee ad hoc network using secret public keys
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
pubcrawl
wireless network
telecommunication security
Security Public Key Cryptography
security
secured PKI scheme
secret public keys
Routing protocols
Routing
resource allocation
Resiliency
public key cryptography
Ad Hoc Network Security
path selection
mobile ad hoc networks
mobile ad hoc network
MANET
load balanced energy enhanced clustered bee ad hoc network
LBEE
Human Factors
Human behavior
Energy Efficiency
composability
biblio
FlowSNAC: Improving FlowNAC with Secure Scaling and Resiliency
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
VNF services
secure scaling
Secure State Migration
process control
secure state transfer
security
service degradation
Load management
product life cycle management
pubcrawl
Resiliency
Monitoring
software defined networking
stateless components
traffic steering
FlowNAC
FlowSNAC
Resilient Security Architectures
resource allocation
resource allocations
resource management
life-cycle management
network function virtualization
NFV
orchestration systems
SDN
SDN/NFV management
authentication
Degradation
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »