Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud systems
biblio
Energy Efficiency Evaluation Based on QoS Parameter Specification for Cloud Systems
Submitted by grigby1 on Thu, 09/16/2021 - 4:05pm
Measurement
System performance
Scientific Computing Security
Resiliency
resilience
quality of service
QoS
pubcrawl
Metrics
belief rule base
High performance computing
Energy Efficiency Evaluation
energy consumption
Conferences
Compositionality
cloud systems
Cloud Computing
Best Worst Method
biblio
Tackling Insider Threat in Cloud Relational Databases
Submitted by grigby1 on Thu, 04/08/2021 - 4:56pm
resource allocation
peer-to-peer model
Peer to peer computing
multiple availability zones
mobile-knowledge bases model
insider threat tackling
Databases
cloud relational database systems
cloud RDMS
cloud computing structures
centralized model
Availability
cloud systems
launch attacks
Peer-to-peer computing
Cloud Security
insider threat
load balancing
Metrics
knowledge based systems
mobile computing
Load modeling
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
insider attacks
security
relational databases
Cloud Computing
security of data
biblio
Deploying Privacy as a Service within a Cloud-Based Framework
Submitted by aekwall on Mon, 12/07/2020 - 12:33pm
cloud-based framework
trustworthy cloud services
software-based
software toolkit
service concepts
privacy regulations
PRIVAaaS
MAPE-K control loop
MAKE-K
good option
feedback control loop
deployment environment
data leakages
Cloud Computing
cloud systems
ATMOSPHERE Platform
privacy violations
cloud
trustworthiness
risk assessment
feedback
privacy
composability
pubcrawl
Trusted Computing
data privacy
biblio
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Scalability
Human Factors
IDS approaches
individual detection accuracy increase
Intrusion Detection
multicloud environments
pubcrawl
resilience
Resiliency
higher detection accuracy
security
security of data
single cloud-based intrusion detection system
suspicious intrusions
trust
trustworthy IDS communities
untrusted IDS
computer theory
central agent
centralized architecture
Cloud Computing
cloud systems
Coalitional game theory
collaboration
complex computer systems
computer network security
Bayes methods
Cyber Attacks
Cyber-security
Detectors
f⊘yw⊘rds-Intrusion detection systems
Game Theoretical Model
game theory
Games
biblio
Dynamic Game Based Security Framework in SDN-enabled Cloud Networking Environments
Submitted by grigby1 on Wed, 09/05/2018 - 10:51am
security
game theory
Human behavior
Scalability
resilience
Resiliency
Human Factors
Control Theory
cloud systems
Distributed Denial of Service (DDoS)
moving target defense (MTD)
software defined networking (SDN)
biblio
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Submitted by BrandonB on Thu, 04/30/2015 - 2:16pm
risk model
multistaged cloud attack
occurrence probability
Prediction algorithms
prediction of multi-staged attacks
Predictive models
probability
risk analysis
risk assessment
multistage attacks
security
security of data
security risk
security technology
security threat
sensors
Vectors
early warning alerts
adaptive risk approach
auto response controller
autonomous cloud intrusion detection framework
Cloud Computing
cloud resources
cloud systems
Correlation
DARPA 2000 dataset
ACIDF
early warnings
finite state hidden Markov model
finite state hidden Markov prediction model
Hidden Markov models
HMM
intrusion prevention
LLDDoS1.0 attack