Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cache storage
biblio
LD-ICN: Towards Latency Deterministic Information-Centric Networking
Submitted by
aekwall
on Mon, 11/30/2020 - 11:04am
IP networks
real-time systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
telecommunication network routing
quality of service
Oscillators
information centric networking
cache storage
in-network caching
policy governance
cache coordination
cache reservation
content cache
content distribution
customized end-to-end resource reservation
deterministic latency
hard latency requirements
ICN cache placement problem
IP-based QoS mechanisms
latency deterministic information-centric networking
Latency Deterministic Networking
LD-ICN
numerous 5G applications
on-path caching technique
optimal cache placement
real-time latency measurement
relevant content objects
route oscillation
source routing-based latency telemetry
telemetry
Internet-scale Computing Security
biblio
Improving Cache Performance for Large-Scale Photo Stores via Heuristic Prefetching Scheme
Submitted by
aekwall
on Mon, 11/30/2020 - 11:03am
Cloud Computing
Servers
Resiliency
Human behavior
pubcrawl
composability
social networking (online)
Metrics
internet
Prediction algorithms
image retrieval
user experiences
China
cache storage
data centers
Sun
policy governance
access latency
advanced cache algorithms
backend network traffic
cache hit ratio
cache performance
cache stack
Caching Algorithm
caching policies
distributed photo caching architecture
distributed storage
heuristic prefetching scheme
high performance expectations
Internet-scale photo caching algorithms
large-scale photo stores
largest social network service company
multitenant environment
performance gap
photo service providers
photo storage
prefetcher
Prefetching
QQPhoto cache efficiency
QQPhoto workload
simple baseline algorithms
Internet-scale Computing Security
biblio
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Submitted by
grigby1
on Wed, 11/04/2020 - 1:13pm
AI Poisoning
authoritative DNS server
cache poisoning attack
cache storage
cached DNS data
compromised authoritative DNS servers
Computer crime
computer network security
Databases
detection method
DNS
DNS based domain name resolution
DNS cache poisoning attacks
DNS cache servers
DNS packet
DNS response packets
DNS security extensions
feature extraction
GeoIP related features
Human behavior
internet
IP networks
Kaminsky attack
learning (artificial intelligence)
machine learning
machine learning techniques
pubcrawl
resilience
Resiliency
Scalability
security of data
Servers
standard DNS protocols
time related features
Training
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by
grigby1
on Fri, 10/30/2020 - 11:15am
i-o systems security
I-O Systems
security
advanced Memway algorithm
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
microarchitectural security threat
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
Scalability
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
biblio
An Open Privacy-Preserving and Scalable Protocol for a Network-Neutrality Compliant Caching
Submitted by
aekwall
on Mon, 09/28/2020 - 11:17am
Detectors
telecommunication traffic
RA
Human behavior
pubcrawl
Protocols
internet
privacy
Feeds
quality of service
QoS
Human Factors
Geometry
Layout
Silicon
Impedance
cache storage
Internet service providers
cyber physical systems
content providers
CP
ISP network
network-neutrality compliant caching
open privacy-preserving scalable protocol
regulator authority
Shamir Secret Sharing scheme
SSS scheme
traffic prioritization
video content distribution
CPS Privacy
biblio
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A
Submitted by
grigby1
on Fri, 08/14/2020 - 10:44am
security of data
pubcrawl
resilience
Resiliency
microprocessor chips
mobile computing
cache storage
performance evaluation
program diagnostics
APIs
application program interfaces
Compositionality
ARMv8 A
ARMv8-A processor
Collabo rative API
flush operation API
Flush+Flush attack
Flush+Flush cache attacks
Flush+Reload attack
mobile phones
obfuscation techniques
secure collaborative API
static code analysis schemes
suspected Flush+Reload
tablets
application programming interface
biblio
An efficient KP-ABE scheme for content protection in Information-Centric Networking
Submitted by
grigby1
on Fri, 07/24/2020 - 11:32am
Access Control
attribute based encryption
attribute-based encryption
cache storage
cached contents
collaboration
computer architecture
computer network security
content protection
Cryptography
Data protection
Data Security
efficient key-policy ABE
efficient KP-ABE scheme
encryption
fast decryption
fast key decryption
fast key generation
FKP-ABE
ICN
indeterminate caches
information-centric networking
internet
Internet traffic
key policy attribute based encryption
KP-ABE
KP-ABE schemes
policy-based governance
pubcrawl
Scalability
self-contained protection
Streaming media
telecommunication traffic
biblio
Modeling a Virtual Reality System with Caching and Computing Capabilities at Mobile User’ Device
Submitted by
grigby1
on Thu, 06/04/2020 - 10:47am
3-Dimensional experiences
3D experiences
augmented reality
cache storage
caching
caching models
composability
computation capability
cyber physical systems
Human Factors
immersive systems
mobile computing
mobile user device
multiuser models
privacy
pubcrawl
resilience
Resiliency
user experience
virtual reality
virtual reality system
VR device
biblio
Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity
Submitted by
grigby1
on Tue, 06/02/2020 - 10:55am
asymmetric connectivity
cache storage
cache-aided end-user
file retrieval
Human behavior
Human Factors
information retrieval
information theoretic security
information theory
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
secure caching
secure delivery
security of data
two-hop combination network
biblio
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
Submitted by
grigby1
on Fri, 05/29/2020 - 2:54pm
Access Control
authorisation
Bilinear Pairing
cache storage
computer science
data confidentiality
DBDH assumption
desired content
desired file
FGAC-NDN
fine-grained access control
fine-grained access control mechanism
Human behavior
Industries
internet
Mobility
named data network
Named Data Network Security
named data networking
network architecture
potential receivers
promising information-centric networking architectures
pubcrawl
Receivers
resilience
Resiliency
Scalability
Servers
specific user
telecommunication network routing
1
2
3
4
5
next ›
last »