Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Buffer storage
biblio
Design of Portable Sensor Data Storage System Based on Homomorphic Encryption Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 11:31am
data storage
portable sensor
homomorphic encryption algorithm
Buffer storage
Homomorphic encryption
Communication Systems
Memory
system design
Knowledge engineering
security
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
biblio
A Restricted Intermediate Node Buffering-Based Contention Control Scheme for OBS Networks
Submitted by grigby1 on Wed, 12/02/2020 - 2:02pm
Optical fiber networks
Intermediate Buffering
key network performance metrics
lightpath connections
lightpath connections paths
network diameter
network radius
OBS networks
Optical buffering
optical burst switching
Optical Burst Switching (OBS)
individual wavelength contention performances
Optical wavelength conversion
partial intermediate buffering provisioning
quality of service (QoS)
resolution measures
restricted intermediate node buffering-based contention control scheme
restricted intermediate node buffering-based routing and wavelength assignment scheme
RI-RWA scheme
standard one-way resource signaling
telecommunication signalling
wavelength assignment
load balancing
resilience
Resiliency
Scalability
quality of service
Routing
telecommunication network routing
telecommunication traffic
telecommunication congestion control
Switches
optical fibre networks
pubcrawl
QoS
Signal resolution
network performance
coupled congestion control
backbone all-optical networks
Buffer storage
contention avoidance
contention resolution
data burst contention
biblio
Run Time Mitigation of Performance Degradation Hardware Trojan Attacks in Network on Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:30pm
hardware trojan
Trojan horses
system-on-chip
semiconductor design
security
run time mitigation
performance degradation Hardware Trojan attacks
NoC
network-on-chip
multiprocessor system on chips
multiprocessing systems
MPSoC
microprocessor chips
integrated circuit design
performance evaluation
Router Architecture
pubcrawl
hardware security issues
Hardware
denial of service attack
Degradation
Cryptography
cryptographic modules
computer architecture
Buffer storage
bit shuffling mechanism
Metrics
resilience
Resiliency
Scalability
network on chip security
biblio
Using Safety Properties to Generate Vulnerability Patches
Submitted by aekwall on Mon, 04/20/2020 - 10:45am
relational databases
vulnerability-specific safety properties
source code patches
Software-Vulnerability
Software-Patch
safety-property
safety property
property-based APR
Program-Analysis
Buffer storage
automatic program repair methods
Automated-Program-Repair
relational database security
program debugging
Engines
Safety
program verification
program diagnostics
software maintenance
security vulnerabilities
Libraries
tools
Metrics
composability
pubcrawl
Human behavior
Resiliency
Software
security
security of data
biblio
The Effect of Buffer Management Strategies on 6LoWPAN's Response to Buffer Reservation Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
resilience
Internet of Things
IoT security
packet drop rate
packets tags
PDR
personal area networks
Protocols
pubcrawl
fragmentation-based buffer reservation DoS attacks
Resiliency
Scoring Systems
slotted buffer
Split Buffer
split buffer mechanism
TCP-IP model
vehicular networking applications
composability
6L0WPAN adaptation layer
6LoWPAN
Adaptation models
buffer circuits
buffer cleanups
buffer management strategies
Buffer Reservation
Buffer storage
6L0WPAN
Computer crime
computer network security
Current measurement
Cyber Physical Systems Security
defence strategies
Fragmentation Attacks
fragmentation-based buffer reservation denial of service attacks
biblio
Predicting buffer overflow using semi-supervised learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Human Factors
vulnerability detection
taxonomy
software security
Semisupervised learning
semi-supervised learning
security of data
Resiliency
pubcrawl
pattern classification
Metrics
machine learning
learning (artificial intelligence)
Indexes
22-dimension vector extraction
Human behavior
Compositionality
Complexity theory
Clustering algorithms
classifier training
C/C++ source files
Buffer storage
Buffer overflows
buffer overflow vulnerability prediction
buffer overflow
AST
arrays
Antlr
biblio
A fast and compact hybrid memory resident datastore for text analytics with autonomic memory allocation
Submitted by BrandonB on Tue, 05/05/2015 - 1:24pm
hybrid memory resident datastore
tree data structures
text analytics
text analysis
Switches
storage management
space-efficient memory-resident datastore
SDRAM
LOUDS tries
level-order unary degree sequence tries
autonomic memory allocation
high-performance memory-resident datastore
hash table
dynamic trie
double array trie
data structures
data placement
Cows
Buffer storage
biblio
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 2:10pm
hackers
translation lookahead buffers monitoring
TLB
system monitoring
security
memory pages identification
legitimate code injection attack
invasive software
Handheld computers
blocks malicious injected code activation
external I/O operations
Decision support systems
data execution prevention
Computer crime
code injection attack detection
Code injection
Buffer storage