Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
overlay networks
biblio
Auditable secure network overlays for multi-domain distributed applications
Submitted by grigby1 on Tue, 02/23/2021 - 1:23pm
actionable contracts
actors
auditable secure network overlays
auditing
communication fabric
composability
computer network security
contracts
Cryptography
Data collection
Data processing
data sharing
digital data market place infrastructure
internet
marketplace
Metrics
multidomain distributed applications
multidomain overlay network
network accountability
operational infrastructure
organisational boundaries
overlay network
overlay networks
Prototypes
pubcrawl
Public key
resilience
Resiliency
software stack
Virtual private networks
biblio
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
security
architecture
Cryptography
data privacy
Organizations
telecommunication security
History
computer architecture
Resiliency
pubcrawl
overlay networks
Peer-to-peer computing
Metrics
trust
Ad hoc networks
MANET
mobile ad hoc networks
Buildings
Compositionality
Network
emergency management
emergency services
building mobile device trust
building resiliency
communication utility patterns
crowd sensing
emergency response networks
MACH 2K
MACH-2K trust overlay network architecture
message confidentiality
Mobile handsets
private mobile devices
public service networks
vpn
manet privacy
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 10:56am
centralized management
Computer crime
computer network security
DDoS Attacks
flooding reconnaissance attacks
internet
Internet Service Provider networks
ISP
link-map
mirrors
moving target defense
MTD
network function virtualization
Network reconnaissance
network topology
NFV
overlay networks
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN
Servers
software defined networking
software defined networking technologies
telecommunication network topology
virtual shadow networks
virtualisation
VSNs
biblio
Blockchain Based Security Framework for P2P Filesharing System
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
blockchain
Blockchain based security framework
collaboration
computer network security
cryptocurrencies
dynamic self-organized technology
file sharing
Free riding
Human behavior
human factor
Human Factors
Metrics
overlay networks
P2P filesharing system
peer to peer security
Peer-to-peer computing
peer-to-peer filesharing system
peer-to-peer network
Protocols
pubcrawl
resilience
Resiliency
Routing
routing table insertion attack
Scalability
security
Sybil attack
biblio
Novel Sybil Defense Scheme for Peer–to–peer Applications
Submitted by aekwall on Mon, 02/18/2019 - 11:58am
peer to peer security
component
composability
computer network security
data availability
Licenses
logically connected hosts
malicious data
Metrics
overlay networks
p2p
peer
Peer-to-peer computing
peer-to-peer network overlays
peer–
proactive
pubcrawl
radio frequency allocation incensing
resource management
Servers
simulation
Social network services
Sybil attack
sybil attacks
sybil defense scheme
sybil nodes
to–
trusted nodes
biblio
Correctness of the routing algorithm for distributed key-value store based on order preserving linear hashing and skip graph
Submitted by grigby1 on Wed, 01/10/2018 - 11:27am
arrays
Compositionality
Distributed databases
distributed key-value store
graph theory
hash algorithms
hop reduction
Limiting
linear hashing
order preserving linear hashing
overlay network
overlay networks
Partitioning algorithms
Peer-to-peer computing
pubcrawl
query forwarding
Resiliency
Routing
routing algorithm
skip graph
telecommunication network routing
uniform routing table
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
composability
computer network security
critical infrastructure
East Asia
Europe
global cloud
high-value applications
internet
intrusion tolerance
intrusion-tolerant network service
intrusion-tolerant overlay implementation
IP infrastructure
IP networks
malicious attacks
Monitoring
network infrastructure
North America
overlay networks
Power Grid
pubcrawl
Reliability
Resiliency
Resilient Networks
Routing
Semantics
biblio
Covert-channel-resistant congestion control for traffic normalization in uncontrolled networks
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
Bandwidth
Compositionality
covert channels
covert-channel-resistant congestion control
Cryptography
local network testbed
Logic gates
network congestion avoidance
overlay networks
overlay topology
Packet loss
pubcrawl
rate-based congestion control mechanism
Resiliency
Scalability
TCP flows
telecommunication congestion control
telecommunication network topology
telecommunication traffic
Traffic analysis
traffic normalization
traffic pattern automatic adjustment
transport capacity
transport protocols
uncontrolled networks
Virtual private networks
vpn
biblio
"ID Based Web Browser with P2P Property"
Submitted by grigby1 on Tue, 02/21/2017 - 11:14am
browser
browser-based Web application
Browsers
caching function
CDN
CDN-P2P-hybrid architecture
content dissemination model
DIANA
domain-insulated autonomous network architecture
host-to-host central model
ID
ID based Web browser
IDNet
internet
Internet content
Internet projects
Internet services
ISP-friendly P2P content delivery technology
online front-ends
overlay networks
p2p
P2P property
Peer-to-peer computing
pubcrawl170103
Servers
streaming content services
Streaming media
Uniform resource locators
usage pattern
web applications
biblio
An Accumulated Loss Recovery Algorithm on Overlay Multicast System Using Fountain Codes
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
accumulate loss recovery algorithm
Decoding
delay reduction
delays
encoding
error correction codes
Fountain codes
multicast communication
overlay multicast system
overlay multicast tree
overlay networks
Packet loss
packet loss decoding
packet radio networks
simulation
trees (mathematics)
1
2
next ›
last »