Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud infrastructure
biblio
A Related work on secure event logs protection with user identity using privacy preservation for the cloud infrastructure
Submitted by grigby1 on Mon, 05/09/2022 - 4:35pm
computer architecture
Monitoring
pubcrawl
resilience
Resiliency
privacy
Companies
Migration
Cloud Security
Scalability
Informatics
cloud computing security
user privacy in the cloud
cloud infrastructure
identify as a service
biblio
Security Chaos Engineering for Cloud Services: Work In Progress
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cloud computing security
traditional security paradigms
security chaos engineering
Resilient Architectures
nonsecurity failures
Human Errors
CloudStrike
Cloud-Security
cloud security system
intrusion tolerance
security models
security risk assessment
cloud infrastructure
Intrusion Detection
chaos
software fault tolerance
Fault tolerant systems
cloud services
security breaches
fault tolerance
testing
composability
pubcrawl
Resiliency
Cloud Computing
security of data
biblio
EL-SEC: ELastic Management of Security Applications on Virtualized Infrastructure
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
SDN
PID controllers
Policy
Policy Based Governance
policy governance
proportional integral derivative controllers
pubcrawl
Recursive InterNetwork Architecture
resilience
Resiliency
RINA
PI controllers
Snort intrusion detection system
software defined networking
three-term control
virtual machines
virtualisation
virtualized infrastructure
virtualized network functions
virtualized security NFs
VNF Snort instances
GENI testbed
autonomic VNF instances scaling
clean slate
Cloud Computing
cloud infrastructure
collaboration
computer network security
Control Theory
EL-SEC framework
elastic management of security applications
Elastic Manager
Attack Analyzer
Human behavior
Human Factors
internetworking
Intrusion Detection
Load management
Metrics
Monitoring
Noise measurement
PI control
biblio
TRUFL: Distributed Trust Management Framework in SDN
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
cloud environment
PKI Trust Models
trust management schemes
Trust management
TRUFL framework scales
transfer rates
public key infrastructure
distributed trust mechanism
distributed trust management framework
digital signatures
data plane-control plane elements
Control Plane-Application Plane
control plane elements
cloud infrastructure
centralized trust management
trust establishment
computer network security
public key cryptography
Public key
SDN
Metrics
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
Trusted Computing
Protocols
authorization
Scalability
Cloud Computing
biblio
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
Scalability
information-centric cloud network security
network virtualization
networking aspects
performance requirements
provision network resources
pubcrawl
resource management
Routing
information centric services
SDN-based framework
security
software assurance
software defined networking
software-defined networking
virtual networks
virtualisation
Virtualization
computer centres
Cloud Computing
cloud data centers
cloud infrastructure
cloud network resources
cloud provider
cloud services
cloud user
composability
cloud applications
computer network performance evaluation
computer network security
delays
fully distributed data plane
information centric cloud framework
Information Centric Cloud Networking
information centric networking
biblio
Resilient Dynamic Data Driven Application Systems as a Service (rDaaS): A Design Overview
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
large scale DDDAS applications
Metrics
pubcrawl
rDaaS
Resiliency
resilient DDDAS
resilient dynamic data driven application systems as a service
Runtime
Internet connectivity
security
security of data
service oriented architecture
service-oriented architecture
Situation Awareness
Software Architecture
web services
Crisis Management applications
Autonomic Security
Cloud Computing
cloud infrastructure
cloud service
command and control
Computational modeling
computer architecture
Crisis Management
agile DDDAS
cyber applications
Cybersecurity
Cyberspace
DDDAS
information fusion
innovative cloud-based architecture
internet
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
file
Session III: Infrastructure, Cloud-Based Systems, Green Approaches - Breakout Session III: Cloud Infrastructure
Submitted by jloyall on Wed, 01/29/2014 - 5:14pm. Contributors:
Joseph Loyall
Ting Zhu
Automotive
CPS Domains
Transportation
CPS Technologies
Foundations
Transportation
hard problems
cloud infrastructure
challenges
applications
Breakout Session 3
Breakout Session 3
2014 National Workshop on Transportation CPS
2014
Academia
Industry