Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
internet
biblio
Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices
Submitted by
grigby1
on Tue, 12/01/2020 - 3:35pm
collaboration
composability
computer network security
computer security
critical infrastructure
critical infrastructures
electric industrial facilities
Home appliances
Human behavior
Human Factors
internet
Internet background radiation traffic
Internet frontier
internet of malicious things
Internet of Things
Internet-scale Computing Security
Internet-scale insecurities
internet-scale unsolicited IoT devices inference
Internet-wide scanning
IoT cyber security situational awareness
IoT malicious raw data
IoT paradigm
Metrics
Policy Based Governance
pubcrawl
resilience
Resiliency
Scalability
smart home appliances
Smart homes
unsolicited Internet-scale IoT devices
unsolicited IoT devices
biblio
Decentralized Labor Record System Based on Wavelet Consensus Protocol
Submitted by
grigby1
on Tue, 12/01/2020 - 1:01pm
blockchain
blockchain based labor record systems
blockchain based system
blockchain solutions
Companies
consensus protocol
contracts
decentralized labor record system
directed acyclic graph system
directed graphs
Employment
employment conditions
employment data
Human behavior
human trust
internet
job market
labor market problems
labor record
labour resources
Portfolios
pubcrawl
recruitment
smart contracts
Turing complete smart contracts platform
wavelet blockchain platform
wavelet consensus protocol
biblio
On the Large-Scale Traffic DDoS Threat of Space Backbone Network
Submitted by
grigby1
on Tue, 12/01/2020 - 12:46pm
Bandwidth
bandwidth resource
composability
Computer crime
computer network security
data communication
Data Transmission
DDoS
DDoS attackers
defense
denial-of-service attack
global coverage
ground networks
IDS
internet
intrusion detection system
large-scale traffic DDoS threat
pubcrawl
reflection
reflection amplification attack
reflection amplification attacks
resilience
Resiliency
satellite communication
satellite network
satellite networks
Satellites
service delivery
space backbone network
space communication links
Space vehicles
telecommunication traffic
terminal devices
biblio
LD-ICN: Towards Latency Deterministic Information-Centric Networking
Submitted by
aekwall
on Mon, 11/30/2020 - 11:04am
IP networks
real-time systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
telecommunication network routing
quality of service
Oscillators
information centric networking
cache storage
in-network caching
policy governance
cache coordination
cache reservation
content cache
content distribution
customized end-to-end resource reservation
deterministic latency
hard latency requirements
ICN cache placement problem
IP-based QoS mechanisms
latency deterministic information-centric networking
Latency Deterministic Networking
LD-ICN
numerous 5G applications
on-path caching technique
optimal cache placement
real-time latency measurement
relevant content objects
route oscillation
source routing-based latency telemetry
telemetry
Internet-scale Computing Security
biblio
Improving Cache Performance for Large-Scale Photo Stores via Heuristic Prefetching Scheme
Submitted by
aekwall
on Mon, 11/30/2020 - 11:03am
Cloud Computing
Servers
Resiliency
Human behavior
pubcrawl
composability
social networking (online)
Metrics
internet
Prediction algorithms
image retrieval
user experiences
China
cache storage
data centers
Sun
policy governance
access latency
advanced cache algorithms
backend network traffic
cache hit ratio
cache performance
cache stack
Caching Algorithm
caching policies
distributed photo caching architecture
distributed storage
heuristic prefetching scheme
high performance expectations
Internet-scale photo caching algorithms
large-scale photo stores
largest social network service company
multitenant environment
performance gap
photo service providers
photo storage
prefetcher
Prefetching
QQPhoto cache efficiency
QQPhoto workload
simple baseline algorithms
Internet-scale Computing Security
biblio
A Distributed Interdomain Control System for Information-Centric Content Delivery
Submitted by
aekwall
on Mon, 11/30/2020 - 11:02am
automobiles
IP networks
Resiliency
Human behavior
pubcrawl
composability
Routing
Metrics
internet
content management
Business
control systems
Scalability
consumers
data planes
in-network caching
Future Internet
policy governance
content delivery
content delivery paths
content sources
control content access
cost-efficient Internet-scale content delivery
CURLING supports efficient Internet-scale content delivery
CURLING system
current Internet
distributed interdomain control system
domain-level Internet subtopologies
dynamic alternative paths
efficient content delivery
facto platform
host-centric
Information-Centric content delivery
Information-Centric Networking (ICN)
information-centric networking paradigm
interdomain hop-by-hop content resolution mechanism
IP-based Internet
large-scale content distribution
manageability
network operators
network policies
Software-defined networking (SDN)
tight coupling
Internet-scale Computing Security
biblio
Neural Adaptive Transport Framework for Internet-scale Interactive Media Streaming Services
Submitted by
aekwall
on Mon, 11/30/2020 - 11:02am
Cloud Computing
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Metrics
neural nets
internet
telecommunication network routing
video signal processing
video streaming
quality of experience
policy governance
adaptive real-time streaming
adaptive real-time streaming strategy
ARS strategy
bandwidth fluctuation
COR scheme
CVP system
deep reinforcement learning
Internet-scale interactive media streaming services
learned resolution scaling
learning based cloud overlay routing scheme
maximal QoE
media services
minimal end-to-end latency
NAT system
network dynamics
neural adaptive transport
neural adaptive transport framework
Overlay routing
QoE improvement
residual neural network based collaborative video processing system
resolution scaling
video bitrate
Internet-scale Computing Security
biblio
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
Submitted by
aekwall
on Mon, 11/23/2020 - 10:39am
Trusted Computing
pubcrawl
collaborative filtering
Social network services
social networking (online)
internet
Prediction algorithms
Training
Filtering
Data mining
trust
collaboration
data science
data sparsity
recommender systems
electronic commerce
Matrix decomposition
Human behavior
human trust
Dianping datasets
ecommerce
matrix factorization
novel personalized recommendation algorithm
personal characteristics
personalized recommendation
personalized recommendation technology
social network information
Social trust
trust relevancy degree
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by
aekwall
on Mon, 11/23/2020 - 10:23am
computer network security
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
security threats
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
3D PAKE protocol
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
heterogeneous networked society
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
biblio
Web server security evaluation method based on multi-source data
Submitted by
aekwall
on Mon, 11/23/2020 - 10:23am
Safety
security of data
IP networks
Scalability
Servers
security
Data models
Resiliency
pubcrawl
internet
web services
information processing
analytic hierarchy process
Compositionality
XML
data sources
evaluation indicators
host security threat assessment values
multi-source data
multisource data
single data source
web security assessments
web security evaluation
web security evaluation model
web server security evaluation method
Intelligent Data Security
Intelligent Data and Security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »