Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage management
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
biblio
Secure Memory for Embedded Tamper-Proof Systems
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
security of data
memory supply voltage manipulation
metastability
Metrics
protection circuitry
pubcrawl
Resiliency
Scalability
secure memory
Memory management
storage management
Tamper resistance
tamper-proof embedded systems
tamper-proof system
Tamper-Resistance
Trusted Component
Voltage measurement
Aerospace electronics
memory instability
memory data leakage protection
memory data change
memory cell circuitry
integrated circuits
Integrated circuit modeling
Human Factors
Human behavior
embedded tamper-proof systems
embedded systems
Data protection
data change scenaria
Cryptography
composability
change memory contents
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
single LRU cache
Nickel
optimal distributed LRU caching
Organizations
probability
reliability theory
reliable caches
resilience
Resiliency
resource management
Scalability
separate LRU caches
single-hop multicache distributed system
Mobile Edge Computing
storage management
symmetric channels
system design
System performance
total cache space
total memory space
unreliable channels
unreliable LRU caches
Web Caching
wired Web servers
wireless content delivery networks
data items
asymptotic miss probabilities
asymptotic miss probability
cache miss ratios
cache storage
channel unreliability probabilities
Communication Systems
counterintuitive characteristics
counterintuitive insights
critical method
data centers
Data-Intensive Applications
asymmetric cache organization
data placement
data replication schemes
data routing strategies
efficient cache organization
efficient data access
explicit unequal allocation policy
fast data access
fundamental method
Hash functions
LRU caching systems
Metrics
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
biblio
An Improved Key Graph Based Key Management Scheme for Smart Grid AMI Systems
Submitted by grigby1 on Mon, 01/27/2020 - 12:25pm
security
Metrics
power engineering computing
Pricing
Protocols
pubcrawl
resilience
Resiliency
Scalability
scalable key management
key management scheme
Smart Grid
smart grid AMI systems
Smart Grids
smart meters
smart power grids
storage management
storage overhead
Unicast
VerSAMI key graph structure
computer network security
automatic meter reading
broadcast communication
broadcast key management performance
broadcast key management protocol
broadcast key management security
broadcast key update process
communication overhead
computer network management
computer network performance evaluation
advanced metering infrastructure
Conferences
Cryptography
graph theory
Human behavior
Human Factors
improved key graph
iVerSAMI
key graph based scheme
key management
biblio
IoT Server Availability Considering DDoS-Attacks: Analysis of Prevention Methods and Markov Model
Submitted by grigby1 on Wed, 12/18/2019 - 2:47pm
Metrics
technical diagnostics
storage management
Software
smart business center diagnostics
Servers
server
SBC server protection
SBC network
Resiliency
resilience
Random access memory
pubcrawl
prevention methods
network servers
authentication
Markov processes
Markov model
IoT server availability
Internet of Things
Industrial Internet of Things
Human behavior
encryption
dependability
DDoS-attacks
DDoS-attack
DDoS Attack Prevention
Databases
computer network security
composability
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Resiliency
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Multicore processing
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
full disk encryption
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
commodity multicore processors
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »