Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Switches
biblio
Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
blockchain security
proof-of-work blockchain
PoW blockchains
mining
history weighted information
hash power
double-spending problems
double-spending attack
Double spending attack
blockchain systems
51% Attack
Switches
security of data
cryptocurrencies
Data mining
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
Protocols
History
Cryptographic Protocols
Scalability
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Attack Strategies
confinement
vulnerable production network
suspicious microservices
security incidents
sandnet
sandbox network
quarantined services
QoD
Production systems
open production network
network deception mechanisms
live confinement
evaluation scenario
container-based microservice architectures
Cloning
computer network security
Degradation
Switches
computer viruses
Containers
cyber-physical systems
sandboxing
Measurement
threat intelligence
privacy
Production
composability
pubcrawl
Resiliency
system monitoring
security
biblio
Optimization Strategy of Flow Table Storage Based on “Betweenness Centrality”
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
policy governance
virtualisation
telecommunication switching
telecommunication network topology
telecommunication control
Switches
software defined networking
Software Defined Network
SDN switch
SDN Flow table optimization
Roads
Resiliency
pubcrawl
Protocols
betweenness centrality
optimization
optimisation
network virtualization
network technology
network architecture
Metrics
Human behavior
flow table storage
Flow Table Optimization
Cloud Computing
clean slate
Big Data
biblio
Wireless Self-Organizing Wi-Fi and Bluetooth based Network For Internet Of Things
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
Bluetooth
bluetooth security
wireless self-organizing Wi-Fi
wireless LAN
Wi-Fi network
Wi-Fi
transmission channels
telecommunication power management
self-organizing networks
open standards
modems
energy-saving modes
energy conservation
Cyber Physical System
Internet of Things
power consumption
cyber physical systems
Wireless fidelity
Routing
wireless networks
wireless channels
Human behavior
resilience
Resiliency
composability
pubcrawl
Power demand
Switches
biblio
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
SwitchMan
pubcrawl
resilience
Resiliency
Scalability
secure protocol
secure user input
security
Servers
Switches
Protocols
usability
usability analysis
user I-O paths
user interfaces
user protected account
user regular account
user screen output
user-level APIs
user-level malware attacks
invasive software
automatic account switching
BIOS Security
computer architecture
computer security
Human Factors
I-O Systems
i-o systems security
information sharing
Input/Output Security
application program interfaces
Keyboards
Linux
mac
malware
Metrics
operating systems
operating systems (computers)
performance evaluation
personal computers
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
privacy protection algorithm
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
collaboration-based location privacy protection method
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
Switches
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
collaboration
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
adaptive filters
adaptive filtering
Tofino switch
programmable switches
NETHCF
memory usage
memory resources
IP2HC
IP-to-Hop-Count mapping table
IP popularity
in-network system
HCF system
end-to-end routing
design adaptive mechanisms
adaptive spoofed IP traffic filtering
computer network security
telecommunication switching
Switches
Pipelines
Bandwidth
telecommunication network routing
internet
Metrics
pubcrawl
Resiliency
Kernel
telecommunication traffic
Servers
Scalability
IP networks
biblio
Enhancing the Reliability of NFV with Heterogeneous Backup
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
NFV
VNF executor
virtual network function
Service Chain
scalable end-to-end service chaining
NFV SFC
heterogeneous backup strategy
Heterogeneous
flexible end-to-end service chaining
data center environments
Backup
back-up procedures
intrusion tolerance
network function virtualization
Switches
security of data
computer centres
Virtualization
Games
Load modeling
game theory analysis
Reliability
composability
pubcrawl
Resiliency
game theory
Software
security
virtualisation
Cloud Computing
biblio
A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case Study
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
SDNSynth framework
resiliency-aware deployment
resilient operation
satisfiability modulo theories
SCADA
SCADA network
SCADA systems
SCADA-based case study
SDN architecture
SDNSynth
resiliency requirements
Smart Grid
Smart Grids
smart power grids
software defined networking
supervisory control and data acquisition network
Switches
synthesis model
synthetic SCADA systems
systematic deployment methodology
legacy forwarding devices
budget constraints
computability
Control Theory and Resiliency
deployment plan
encoding
formal model
formal modeling
hybrid network
incremental deployment
pubcrawl
network synthesis
network topology
novel grid control operations
power engineering computing
programmable SDN-enabled switches
real-time data
resilience
Resiliency
biblio
Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
path-based dissimilarity function
Walk2Privacy mechanism
Walk2Privacy algorithm
Task Analysis
Target link privacy preserving
target link privacy disclosure
Switches
submodularity property
social networking (online)
self-avoiding random walk
scale social graphs
Scalability
pubcrawl
privacy
adversarial link prediction
monotonicity property
Link prediction
Link deletion.
Indexes
greedy link deletion
Graph utility
graph theory
GLD2Privacy mechanism
data privacy
data deletion
Computational modeling
Big Data
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »