Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cache storage
biblio
A Fundamental Analysis of Caching Data Protection Scheme using Light-weight Blockchain and Hashchain for Information-centric WSNs
Submitted by aekwall on Thu, 04/08/2021 - 4:30pm
Scalability
Cryptography
Resiliency
pubcrawl
wireless sensor networks
blockchain
Information Centric Networks
mobile devices
cache storage
lightweight blockchain
exhaustive mining computations
hashchain
information-centric wireless sensor networks
information-centric WSNs
novel caching data protection scheme
proof-of-consensus validation mechanism
resource-shortage wireless devices
Secure caching scheme
verification procedure
wide-area wireless environments
biblio
GDGCA: A Gene Driven Cache Scheduling Algorithm in Information-Centric Network
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
Scalability
Data models
Resiliency
pubcrawl
simulation
internet
resource allocation
telecommunication network routing
Throughput
ICN
Information Centric Networks
information entropy
scheduling
greedy algorithms
Stochastic processes
cache storage
Scheduling algorithms
telecommunication scheduling
information-centric networking
Accurate Poisson stream
cache capacity
Content analysis
content cache replacement
data popularity
Distributed cache scheduling
future network architecture
GDGCA
gene driven cache scheduling algorithm
gene driven greedy caching algorithm
ICN edge router
ICN environment
ICN scenario
information centered concept
information distribution scheduling algorithm
information epilepsy
Information Gene
information gene value
information-centric network
optimal simulation model
Poisson data volumes
QoE index
satisfaction degree
self-caching network
user-centered concept
biblio
Analysis of Content Availability at Network Failure in Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
Scalability
Resiliency
pubcrawl
Robustness
internet
Analytical models
Mathematical model
network topology
Routing protocols
Measurement
telecommunication network topology
information-centric networking
Information Centric Networks
computer network reliability
cache storage
average content availability
caching contents
cluster-based node removal
content availability
contents server
host-centric networks
information-centric net-working (ICN)
network failure
network robustness
node removal
nodes reachability
random node removal
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
adversarial reconnaissance
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
data privacy
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
Network reconnaissance
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
security of data
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
biblio
liteNDN: QoS-Aware Packet Forwarding and Caching for Named Data Networks
Submitted by aekwall on Mon, 02/22/2021 - 1:36pm
Scalability
telecommunication traffic
Data Security
Resiliency
Human behavior
pubcrawl
internet
telecommunication network routing
quality of service
named data networking
network communication
cache storage
named data networks
in-network caching
data retrieval
cache hit rate
caching normal
caching policy
computing devices
conventional NDN forwarding
cooperative forwarding strategy
data retrieval latency
data significance
forwarding strategy
Heuristics
liteNDN
multipath forwarding
NDN networks
NDN routers
network utilization
packet forwarding decisions
probability estimation
QoS-aware packet caching
QoS-aware packet forwarding
routing costs
biblio
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
Scalability
telecommunication traffic
Resiliency
Human behavior
pubcrawl
simulation
Computational modeling
convergence
internet
trees (mathematics)
network traffic
delays
telecommunication network topology
network performance
named data networking
computer science
information-centric networking
cache storage
Time complexity
in-network caching
named data network
Abilene network topologies
Cache Replacement Strategy
caching algorithms
caching strategy
computer network
content replacement scheme
ICN primary features
Internet requirements
Randomized LFU
Tree network topologies
biblio
LD-ICN: Towards Latency Deterministic Information-Centric Networking
Submitted by aekwall on Mon, 11/30/2020 - 12:04pm
IP networks
real-time systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
telecommunication network routing
quality of service
Oscillators
information centric networking
cache storage
in-network caching
policy governance
cache coordination
cache reservation
content cache
content distribution
customized end-to-end resource reservation
deterministic latency
hard latency requirements
ICN cache placement problem
IP-based QoS mechanisms
latency deterministic information-centric networking
Latency Deterministic Networking
LD-ICN
numerous 5G applications
on-path caching technique
optimal cache placement
real-time latency measurement
relevant content objects
route oscillation
source routing-based latency telemetry
telemetry
Internet-scale Computing Security
biblio
Improving Cache Performance for Large-Scale Photo Stores via Heuristic Prefetching Scheme
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
Cloud Computing
Servers
Resiliency
Human behavior
pubcrawl
composability
social networking (online)
Metrics
internet
Prediction algorithms
image retrieval
user experiences
China
cache storage
data centers
Sun
policy governance
access latency
advanced cache algorithms
backend network traffic
cache hit ratio
cache performance
cache stack
Caching Algorithm
caching policies
distributed photo caching architecture
distributed storage
heuristic prefetching scheme
high performance expectations
Internet-scale photo caching algorithms
large-scale photo stores
largest social network service company
multitenant environment
performance gap
photo service providers
photo storage
prefetcher
Prefetching
QQPhoto cache efficiency
QQPhoto workload
simple baseline algorithms
Internet-scale Computing Security
biblio
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Submitted by grigby1 on Wed, 11/04/2020 - 2:13pm
AI Poisoning
authoritative DNS server
cache poisoning attack
cache storage
cached DNS data
compromised authoritative DNS servers
Computer crime
computer network security
Databases
detection method
DNS
DNS based domain name resolution
DNS cache poisoning attacks
DNS cache servers
DNS packet
DNS response packets
DNS security extensions
feature extraction
GeoIP related features
Human behavior
internet
IP networks
Kaminsky attack
learning (artificial intelligence)
machine learning
machine learning techniques
pubcrawl
resilience
Resiliency
Scalability
security of data
Servers
standard DNS protocols
time related features
Training
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
i-o systems security
I-O Systems
security
advanced Memway algorithm
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
microarchitectural security threat
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
Scalability
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
1
2
3
4
5
6
next ›
last »