Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data structures
biblio
Graph Sketching against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
pubcrawl
matrix elimination orderings
Metrics
minimum degree algorithm
minimum fill degree
nearly-linear time algorithm
oblivious adversary model
polylogarithmic time
provable approximation
Human behavior
query processing
randomised algorithms
randomized data structure
Resiliency
Scalability
sketching data structure
Sparse matrices
combinatorial scientific computing
adaptive adversarial model
adaptive adversaries applied
Adversary Models
approximate fill degrees
approximate greedy minimum degree orderings
Approximation algorithms
approximation theory
combinatorial mathematics
Adaptation models
computational complexity
computer science
Data models
data structures
graph sketching
graph theory
Heuristic algorithms
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
IPC-1782 standard for traceability of critical items based on risk
Submitted by grigby1 on Mon, 12/03/2018 - 1:51pm
risk assessment
predictive maintenance
product innovation
product safety
production engineering computing
Productivity
pubcrawl
Reliability
resilience
Resiliency
OEM companies
risk management
Scalability
single expandable data structure
standards
supply chain management
supply chain risk assessment
supply-chain data
tools
traceability data collection persists
data structures
automation
Big Data
Companies
component traceability
consumer behaviour
consumer products
cost reduction
critical safety systems
customer satisfaction
automated processes End to End
Design engineering
design requirements
Industries
Industry 4.0
innovation management
integrating quality
IPC-1782 standard
manufacturing systems
Metrics
biblio
Blockchain: Solving the Privacy and Research Availability Tradeoff for EHR Data: A New Disruptive Technology in Health Data Management
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
policy maker institutions
health system developers
Human Factors
law regulations
lifelong recorded patient health data
Medical services
multisignature data access
patient data
patient privacy
Health information ecosystem
policy makers
population health management
privacy
privacy data
protective principles
pubcrawl
Scalability
secure data storing
defensive data hiding attitude
blockchain
blockchain technology
Business
cryptographically secured data storage
Cryptography
data availability
data privacy
data structures
American HIPAA regulation
disruptive technology
EHR
EHR data
electronic health records
ethical problems
expert systems
health data management
Health data storage
biblio
Deep packet inspection using Cuckoo filter
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
matched filters
Traffic identification
Traffic classification
telecommunication traffic
signature fingerprint
Scalability
Resiliency
resilience
Quotient Filter
pubcrawl
membership query data structures
matching check tool
Bloom filter
k hash functions
Internet service providers
internet
Inspection
Information filters
high performance DPI approaches
Fingerprint recognition
filtering algorithms
deep packet inspection
data structures
Cuckoo filter
biblio
A Remote Data Integrity Checking Scheme for Big Data Storage
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
fine-grained update
Servers
Scalability
remote data integrity checking scheme
remote data integrity checking
pubcrawl
privacy
Memory
mapping relationship
Indexes
Balanced update tree
dynamic update
data structures
data privacy
Data models
data integrity
data deletion
data block
big data storage
Big Data
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »