Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bandwidth
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
Dynamically Reconfigurable Slice Allocation and Admission Control within 5G Wireless Networks
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Radio Access Network
integrated user application-specific demand characteristics
intra-slice resource sharing elasticity
massive machine type communication
network characteristics evaluation
network load
network utility
online slice allocation model
quality of experience
heterogeneous traffic demand
resource allocation decision metric
resource allocation framework performance
resource management
service demand
slice resource block-size
ultra-reliable low-latency communication
predictive security metrics
Internet of Things
estimation theory
enhanced mobile broadband
Dynamic scheduling
dynamic intra-slice decision boundary estimation model
Bandwidth
admission control strategy
Admission control
5G wireless network
resource allocation
Metrics
telecommunication congestion control
telecommunication traffic
quality of service
5G mobile communication
pubcrawl
biblio
PSA: An Architecture for Proactively Securing Protocol-Oblivious SDN Networks
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
pubcrawl
unified security defense framework
telecommunication control
software-defined network (SDN)
software-defined network
software defined networking
security defense function
security defense application
security
SDN security
SDN infrastructure
Scalability
Resiliency
resilience
Bandwidth
Protocols
protocol-oblivious forwarding (POF)
proactively securing protocol-oblivious SDN networks
proactive security layer
proactive security framework PSA
proactive security
Optical fibers
data-to-control plane saturation attack
control systems
computer network security
computer architecture
business logic
Business
biblio
A Scientific Data Traffic Scheduling Algorithm Based on Software-Defined Networking
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Scientific Computing Security
traffic scheduling algorithm
traffic scheduling
telecommunication scheduling
SDN-based traffic scheduling algorithm
scientific data transfer
scientific data traffic scheduling algorithm
scientific data flow transfer
scientific big data transfer
Science DMZ model
Scheduling algorithms
private network
network security devices
data plane
common data flow
software-defined network
computer network security
Compositionality
scientific information systems
Predictive Metrics
Switches
resilience
Firewalls (computing)
delays
Bandwidth
software-defined networking
pubcrawl
software defined networking
data flow computing
performance evaluation
telecommunication traffic
biblio
Adaptive Network Management for Safety-Critical Systems
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
Bandwidth
predictability
Security Heuristics
Safety-Critical Systems
optimization algorithm
fault diagnosis
Dijkstra algorithm
complex network configurations
adaptive network management
Device-to-device communication
computer network reliability
timing
Safety
resilience
security
software-defined networking
telecommunication network routing
optimisation
optimization
Routing
pubcrawl
Resiliency
software defined networking
computer network management
telecommunication traffic
Scalability
computer network security
biblio
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
resilience
Virtualization
virtualisation
virtual security function
software-defined networking
software defined networking
smart power grids
Smart Grids
Servers
security function virtualization
security
SDN-enabled smart grid
SDN security
Scalability
Resiliency
Bandwidth
pubcrawl
power system security
power engineering computing
nonlinear programming
moving target defense
Monitoring
Metrics
integer programming
integer nonlinear programming problem
dynamic defense methods
computer network security
Communication networks
centralized SDN controller
biblio
Optimal Cache Placement and Migration for Improving the Performance of Virtualized SAND
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
software controlled virtualized DASH environments
resilience
Resiliency
SAND
SAND architecture
Scalability
SDN
SDN controller
Servers
Software
software controlled virtualized approaches
quality of experience
standards
Streaming media
video streaming
virtualisation
virtualized caches
virtualized DANEs
virtualized SAND deployments
Web Caching
web-caches
end-users
adaptive video techniques
Bandwidth
cache location algorithm
cache migration algorithm
cache storage
DANE
DASH
DASH Aware Network Elements
dominant Internet applications
pubcrawl
good foundation
high QoE
HTTP
hypermedia
internet
Metrics
MPEG standard
optimal cache placement
optimal locations
biblio
Cutting Throughput with the Edge: App-Aware Placement in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
mobile computing
generation IoT-based services
greedy algorithm
greedy algorithms
integer programming
Internet of Things
IoT
IoT applications
location awareness
mixed integer nonlinear optimisation
FogAtlas
nonlinear programming
optimization
placement
pubcrawl
raw data transfers
Resiliency
resource allocation
Scalability
delays
Bandwidth
central cloud
Cloud Computing
cloud computing technology
cloud module
communication demands
Computation offloading
Containers
app-aware placement
dynamic computation
edge computing
edge devices
fog application
Fog computing
Fog Computing and Security
fog computing platform
fog module
biblio
Simulation Study on Wideband Transducer with Longitudinal-Flexural Coupling Vibration
Submitted by aekwall on Mon, 01/13/2020 - 12:08pm
Broadband communication
acoustic coupling
Vibrations
transmission voltage response
Piezoelectric transducer
piezoelectric oscillators
piezoceramics
numerical simulation
multimode coupled transducer
longitudinally polarized piezoelectric ceramic piece
longitudinal-flexural coupling
longitudinal-flexural coupled vibration transducer
Longitudinal-flexural coupled
longitudinal bending
Scalability
Broadband
bending
Resonant frequency
numerical analysis
ultrasonic transducers
Transducers
piezoelectric transducers
Acoustics
finite element analysis
Bandwidth
pubcrawl
Human behavior
Resiliency
biblio
Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
privacy preserving communication
IoT-enabled shopping experience
local coupon storage
localized coupons
Mobile Applications
mobile computing
mobile device
Mobile handsets
privacy
IoT technology
privacy-preserving smart retail environments
pubcrawl
purchasing
retail data processing
Scalability
Servers
wireless channels
Wireless communication
data privacy
Bandwidth
BLE
Cloud Computing
cloud-based systems
coupon safety
CouponHubs
cryptographic management
Cryptography
Aggio
edge computing
electronic coupon distribution system
expert systems
Human Factors
Internet of Things
Internet-of-Things devices
IoT
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »