Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PSPACE-complete
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization
Submitted by aekwall on Mon, 03/30/2020 - 11:33am
graph segmentation operator
Approximation algorithms
boundary criteria
context free language
context-free grammar
data science lifecycle provenance
data science platforms
destination vertices
graph data models
graph query
graph query model
approximation theory
graph summarization operator
high-level graph query operators
model management
provenance ingestion mechanisms
provenance management
PSPACE-complete
query techniques
Skeleton
source vertices
optimisation
Resiliency
Human behavior
pubcrawl
composability
graph theory
Metrics
query processing
Databases
context-free grammars
Data models
computational complexity
meta data
metadata
Writing
Pipelines
Semantics
Provenance
data science
data handling