Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
fault tolerant computing
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Protocols
Resiliency
pubcrawl
composability
sybil attacks
Peer-to-peer computing
Metrics
standards
fault tolerant computing
cryptocurrencies
Distributed databases
Probabilistic logic
Topology
malicious attacks
open systems
Weight measurement
Resistance
distributed ledgers
proof-of-stake
address-based peer sampling service
Blockchain mechanisms
Byzantine fault-tolerant protocols
Byzantine-tolerant peer-sampling service
decentralized systems
epidemic protocols
HAPS
perfect peer-sampling service
permissionless systems
Proof-of-work
sybils
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by grigby1 on Wed, 12/02/2020 - 1:01pm
pubcrawl
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
network topology
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
equipment failure
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
massive topology degradation
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
API interoperability issues
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
cloud security system
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
fault tolerance
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
reference CSB system
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
Cloud Computing
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
performance evaluation
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
cloud computing system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
local file system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
computer network security
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
composability
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
side-channel attacks
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
load dynamics
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 11:14am
Intrusion Detection
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
machine learning
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
performance evaluation
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
cybersecurity intrusion detection
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
security of data
computer network security
Monitoring
distributed processing
Protocols
SCADA
SCADA systems
Resiliency
pubcrawl
composability
network attacks
Substations
power grids
fault tolerant computing
power system reliability
resilience
computer centres
Power Grid
intrusion tolerance
data centers
network attack
control centers
data acquisition systems
nation-state-level attackers
network-attack-resilient intrusion-tolerant SCADA
power grid infrastructure
SCADA system management
simultaneous intrusions
sophisticated network-level attacks
Spire
supervisory control
System recovery
biblio
Intrusion-Tolerant Autonomous Driving
Submitted by aekwall on Mon, 07/27/2020 - 11:11am
automobiles
autonomous vehicles
Safety
security of data
traffic engineering computing
Task Analysis
Kernel
computer architecture
Resiliency
pubcrawl
composability
fault tolerant computing
distributed systems
Autonomous Driving
Sophisticated Attacks
real-time systems
complex software
fault and intrusion tolerance
fault-and-intrusion tolerance toolboxes
highly skilled equipped adversarial teams
intrusion tolerant design
intrusion-tolerant architecture
intrusion-tolerant autonomous driving
killer application
predictable hardware
real time systems
well equipped adversarial teams
intrusion tolerance
biblio
Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies
Submitted by grigby1 on Thu, 07/16/2020 - 10:56am
Adaptation models
adaptive allocation
collaborative simulation time sequence push strategy
composability
Computational modeling
Control Strategy
CPS modeling
Cyber Physical System
cyber-physical systems
fault tolerance
fault tolerance policies
fault tolerant computing
Fault tolerant systems
Fault-Tolerant CPS
fault-tolerant CPS simulation platform
Hardware
hardware redundancy technology physical backup
hierarchical adaptive policies
hierarchical model
inter-layer message transmission mechanism
message passing
Metrics
Nickel
node activity test mechanism
physical backup
pubcrawl
Redundancy
resilience
Resiliency
resource allocation
safety-critical key infrastructures
simulation test
simulation testing
simulations
SPB-CPS simulation test efficiency
test resources
biblio
Fault tolerant non-linear techniques for scalar multiplication in ECC
Submitted by aekwall on Mon, 07/06/2020 - 8:57am
Scalability
encryption
Resiliency
Human behavior
pubcrawl
policy-based governance
Metrics
fault tolerant computing
public key cryptography
security level
Elliptic curve cryptography
ECC
cryptology
asymmetric cryptography algorithms
case channel error detection codes
cryptographic computations
elliptic curve scalar multiplication point
error detection codes
false information
Fault Tolerant
fault tolerant nonlinear techniques
faulty results
injected faults
nonlinear error detection codes
Scalar multiplication point
shorter key length
1
2
3
4
next ›
last »