Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
On Pending Interest Table in Named Data Networking based Edge Computing: The Case of Mobile Augmented Reality
Submitted by aekwall on Mon, 03/02/2020 - 11:29am
Human Factors
Ubiquitous Computing Security
remote computation
PIT expiry time
pending interest table
NDN based EC
Mobility
mobile augmented reality
latency
interest satisfaction rate
host centric IP architecture
distributed computation
storage resources
augmented reality
named data networking
security
edge computing
internet
Metrics
pubcrawl
Resiliency
computer architecture
mobile computing
Task Analysis
Internet of Things
Scalability
IP networks
Cloud Computing
security of data
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale
Submitted by grigby1 on Mon, 02/17/2020 - 4:16pm
resilience
metadata
Metrics
multidimensional anomaly detection fusing HPC Analytics and Tensors
network topology
parallel processing
parallelized graph analysis
pattern clustering
pubcrawl
MADHAT
Resiliency
security of data
sensor fusion
situational awareness
structured network sensor logs
Tensile stress
tensors
tools
groupware
Security Metrics
clustering methods
composability
data structures
Detectors
Electronic mail
graph analytics
graph theory
Computing Theory
high-performance packages
HPC architecture for cyber situational awareness
HPC resources
HPC scale
integrated workflow
IP networks
large-scale sparse tensor decompositions
biblio
Research on Linkage Model of Network Resource Survey and Vulnerability Detection in Power Information System
Submitted by aekwall on Mon, 02/17/2020 - 1:41pm
information security
Vulnerability Verification
vulnerability scanning
Resource Survey
power information network resource survey
power information network management
Power Information Network
network resource survey
linkage model
information networks
Couplings
Compositionality
Graphics
security of data
power systems
power information system
Information systems
power engineering computing
tools
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
IP networks
biblio
Risk and avoidance strategy for blocking mechanism of SDN-based security service
Submitted by aekwall on Mon, 02/17/2020 - 1:28pm
Monitoring
Switches
software-defined network
software defined networking
Security Risk Management
security
SDN-based Security Services
SDN-based security service
SDN security
SDN attack
Scalability
risk management
risk analysis
Resiliency
pubcrawl
Protocols
Dynamic Networks and Security
Metrics
malicious host
IP networks
IP forging
IEC standards
forged packets
forged IP address
dynamic network technology
data planes
cost-effective risk avoidance strategy
computer network security
blocking mechanism
attack scenario
composability
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 11:05am
data loss
Smart Grid Sensors
Wireless Communication Network (WCN)
WCN
Smart Sensor
smart grid wireless network
smart grid communication network
nearby nodes
Internet Protocol address
Internet Protocol (IP)
higher degree nodes
grid power flow
graph theory approach wireless communication network
fuzzy rules
fuzzy logic approach
extreme IP
security of data
cyber intrusion
cyber-attack
Compositionality
Human Factors
radio networks
power system security
power engineering computing
Smart Grid
Fuzzy logic
smart power grids
graph theory
pubcrawl
Resiliency
smart devices
IP networks
biblio
Multi-core Heterogeneous Video Processing System Design
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
image binarization
multicore computing security
Zynq
Xilinx Zynq platform
real-time video image processing system
Otsu binarized hardware-accelerated IP
otsu adaptive binarization
multicore heterogeneous video processing system design
multicore heterogeneous computing technology
multicore heterogeneous acceleration processing
multi-core heterogeneous
image processing speed
field programmable gate arrays
hardware acceleration
multiprocessing systems
microprocessor chips
video signal processing
Metrics
pubcrawl
Resiliency
system-on-chip
Scalability
IP networks
biblio
Cloud-based Multi-core Architecture against DNS Attacks
Submitted by aekwall on Mon, 02/10/2020 - 10:57am
IP networks
Website visits
support service
security of data
Scalability
Resiliency
pubcrawl
network security
multiprocessing systems
multicore computing security
Metrics
malicious flow cleaning
Kernel
Artificial Intelligence
intelligent routing
flow cleaning
domain name resolution system
domain name resolution
DNS principle
DNS intelligent cloud system
DNS attacks
Defense Technologies
Computer crime
cloud-based multicore architecture
Cloud Computing
cleaning
biblio
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log
Submitted by grigby1 on Mon, 02/10/2020 - 10:17am
Metrics
unsolicited e-mail
Training
system monitoring
supervised learning
spoofed e-mails
SPF
spam mail
spam domain detection
spam detection
sender IP address
sender domain authentication
Scalability
pubcrawl
Postal services
active DNS
message authentication
IP networks
internet
Human Factors
Human behavior
feature extraction
Electronic mail
e-mail reception log
e-mail log analysis
DMARC
DKIM
authentication
active DNS data
biblio
Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network
Submitted by grigby1 on Tue, 01/21/2020 - 11:10am
Metrics
Zigbee
wireless networks
timeslot allocation method
timeslot allocation
secure join
resource management
resource limitation problem
Resiliency
resilience
radio networks
pubcrawl
policy-based governance
multiple node join mechanism
collaboration
Mesh networks
IPv6-based industrial wireless network
ipv6 security
IPv6
IP networks
internet
industrial wireless network
IEEE 802.15.4e network
IEEE 802.15 Standard
Cryptography
computer network security
composability
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »