Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bandwidth
biblio
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework
Submitted by aekwall on Mon, 12/30/2019 - 11:16am
Internet of Things
Task Analysis
Servers
security-sensitive computation task
security of data
security
Scalability
resource allocation
Resiliency
pubcrawl
mobile computing
mixed integer programming multicommodity flow
Mixed integer programming
joint offloading approach
IoT application
IoT
Bandwidth
integer programming
greedy algorithms
greedy algorithm
fog-cloud provider
fog-cloud framework
Fog-cloud computing
Fog Computing and Security
delays
delay-aware secure computation offloading mechanism
Computational modeling
computation resources
computation offloading problem
completion delays
Cloud Computing
biblio
DDoS Mitigation: Decentralized CDN Using Private Blockchain
Submitted by aekwall on Wed, 12/18/2019 - 1:24pm
Bandwidth
public administration
private blockchain
military organizations
military agencies
government agencies
distributed CDN Schema
Content Delivery Network(CDN)
content delivery network
CDN system
DDoS attack mitigation
resilience
contracts
military computing
Computer crime
Companies
internet
Metrics
composability
pubcrawl
Human behavior
Cryptography
Servers
IP networks
distributed denial of service attacks
ddos mitigation
computer network security
biblio
LevelTree: A New Scalable Data Center Networks Topology
Submitted by grigby1 on Mon, 12/16/2019 - 2:59pm
shortest path
LevelTree
network topology
new scalable data center network topology
pubcrawl
resilience
Resiliency
Scalability
Servers
Jellyfish
telecommunication network routing
telecommunication network topology
topological properties
Topology
tree topology
Vegetation
VolvoxDC
Data Center Network(DCN)
Bisection Bandwidth
cloud based applications
computer centres
computer networks
Control Theory
critical topologies
Cyber Physical System
cyber physical systems
Bandwidth
data centers
DCN topology
Diameter of graph
Fattree
graph theory
high bisection bandwidth
Human behavior
biblio
Joint Source Channel Coding with Bandwidth Compression
Submitted by aekwall on Mon, 11/25/2019 - 1:06pm
digital techniques
Wyner-Ziv coding
wireless channels
quantization scaling factor
Quantization (signal)
quantisation (signal)
memoryless bivariate Gaussian source
mean-squared error distortion
joint source channel coding
hybrid digital-analog coding system
hybrid digital-analog (HDA) coding
HDA schemes
Gaussian channels
Gaussian broadcast channel
digital-analog coding system
Resiliency
Costa coding
combined source-channel coding
channel coding
Broadcasting
Bandwidth compression
analog information
broadcast channels
distortion
Bandwidth
Mathematical model
Metrics
composability
pubcrawl
biblio
Light-Weighted Security Access Scheme of Broadband Power Line Communications for Multi-Source Information Collection
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
remote information collection
multisource data acquisition services
multisource information collection
power consumption
power consumption information acquisition system
Power Line Communication
Power line communications
power meters
Predictive Metrics
Protocols
pubcrawl
Multi-meter reading
resilience
Resiliency
Resistance heating
security
security access
services security isolation
smart meter-reading technologies
smart meters
terminal access
Water heating
data acquisition
Bandwidth
broadband power line communications
Business
carrier transmission on power lines
channel security isolation
communication modes
communication optimization
communication protocols
communication reliability
composability
acquisition terminals
electrical interfaces
heat meters information collection services
integrated meter service
light-weighted security access scheme
meter terminals
meter-reading service
Meters
Metrics
Microelectronics Security
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Lightweight Security Signaling Mechanism in Optical Network for Smart Power Grid
Submitted by aekwall on Mon, 03/18/2019 - 8:54am
Protocols
trusted connection
smart power grids
smart power grid environment
Smart Grids
smart grid security
Smart Grid
signaling interaction
signaling encryption
security signaling
security level
security improvement
security
Scalability
Resiliency
pubcrawl
backbone optical networks
power engineering computing
optical receivers
optical fibre networks
Optical fiber networks
multidomain communication services
multi-domain optical network
Metrics
lightweight security signaling protocol
lightweight security signaling mechanism
large-scale multidomain optical network
internet
computer network security
communication security issue
Bandwidth
biblio
Towards Blockchain-Based Scalable and Trustworthy File Sharing
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
ensures confidentiality
Writing
Trustworthy Systems
trustworthy file sharing
Trusted Computing
scalable key management mechanism
revoked users
Resiliency
resilience
pubcrawl
proxy re-encryption based design
Peer-to-peer computing
malicious behaviour
files integrity
file organisation
file encryption keys
Access Control
encryption
encrypted file sharing
distributed proxies
distributed ledgers
distributed access control
data management
cyber physical systems
Cryptography
cryptocurrency
composability
blockchain- based file storage systems
blockchain technology
Bandwidth
authorisation
auditable information
biblio
How Far Can We Push Flow Analysis to Identify Encrypted Anonymity Network Traffic?
Submitted by grigby1 on Thu, 01/31/2019 - 11:19am
JonDonym
traffic flow Identification
traffic flow behavior
Traffic flow
Tor
tools
telecommunication traffic
Resiliency
resilience
pubcrawl
Protocols
Metrics
machine learning
learning (artificial intelligence)
anonymity
internet
I2P
Human Factors
Human behavior
flow analysis approach
encryption
encrypted anonymity network traffic
dataset
data privacy
Cryptography
composability
Bandwidth
anonymity network users
biblio
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two
Submitted by grigby1 on Thu, 01/31/2019 - 11:18am
low latency overhead
trilemma
telecommunication security
Synchronization
strong anonymity
sender anonymity
Resiliency
resilience
Recipient Anonymity
pubcrawl
Protocols
privacy
Petri nets
nontraditional bandwidth
Metrics
AC protocol nodes
low bandwidth overhead
latency overhead choices
Human Factors
Human behavior
fundamental constraints
Cryptography
composability
bandwidth overhead
Bandwidth
anonymous communication protocols
anonymity trilemma
anonymity
AC systems
AC protocols
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »