Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
resource management
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by
aekwall
on Mon, 12/21/2020 - 12:28pm
IoT
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
sensors
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
iiot
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
IoT-IIoT networks
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by
aekwall
on Mon, 12/14/2020 - 11:43am
Resiliency
pubcrawl
composability
sybil attacks
resource management
Wireless communication
Metrics
Interference
radio networks
Resists
electronic commerce
DSA
Cost accounting
dynamic spectrum access
2D truthfulness
bid-independent sorting method
cost-efficient SUs
onlIne spectrum allocation
online spectrum auction
primary user Sybil-proof aUctioN mechAnisM
sequential matching approach
single secondary user
spectrum allocation efficiency
spectrum shortage problem
Sybil-proof spectrum auction mechanisms
Truthful user Sybil-proof aUctioN mechAnisM
Tsunami
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by
aekwall
on Mon, 12/14/2020 - 11:42am
computer network security
network security
Resiliency
pubcrawl
composability
detection
Sybil attack
graph theory
resource management
Metrics
sybil attacks
Web sites
Relays
integer programming
Communication Systems
Approximation algorithms
Bridges
detection method
Linear programming
Bipartite graph
anonymous communication system
computer program
Distribution strategy
enumeration attacks
Integer Linear Program
minimum malicious user
resource distribution
resource distribution process
suspicious malicious users
tor anonymous communication system
tor resource distribution
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by
aekwall
on Mon, 12/14/2020 - 11:38am
5G
composability
Compositionality
Evolutionary algorithms
Grey Wolf optimizer
Interference
joint user association-power allocation
multi-access systems
multiple base stations
NOMA
NOMA networks
Non-Orthogonal Multiple Access (NOMA)
nonorthogonal multiple access networks
orthogonal clusters
particle swarm optimisation
particle swarm optimization
physical resource block allocation
power allocation
PSO
pubcrawl
Receivers
resource allocation
resource management
Signal to noise ratio
Silicon carbide
Swarm Intelligence
swarm intelligence algorithms
user association
user grouping procedure
weighted sum rate maximization
biblio
Intelligent Resource Scheduling at Scale: A Machine Learning Perspective
Submitted by
grigby1
on Tue, 12/01/2020 - 3:37pm
ad-hoc heuristics
Cloud Computing
cloud-scale
collaboration
composability
data centers
exhibited heterogeneity
Human behavior
Human Factors
intelligent resource scheduling
Internet-scale Computing Security
Internet-scale systems
large-scale resource scheduling
Large-scale systems
learning (artificial intelligence)
machine learning
Metrics
ML
multidimensional resource requirements
nonfunctional constraints
performance-centric node classification
Policy Based Governance
Processor scheduling
pubcrawl
quality of service
resilience
Resiliency
resource allocation
resource management
Resource Scheduling
Scalability
scheduling
server characteristics
Servers
straggler
straggler mitigation
Task Analysis
workload
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by
grigby1
on Tue, 11/17/2020 - 1:51pm
actor-critic-mass algorithm
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
Human Factors
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
Mean-field game
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
probability
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
biblio
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Submitted by
grigby1
on Fri, 09/18/2020 - 12:56pm
learning (artificial intelligence)
learning rate
security
pubcrawl
resilience
Resiliency
Heuristic algorithms
security issues
telecommunication security
radio networks
resource management
attacks
Reinforcement learning
clustering
pattern clustering
Scalability
cognitive radio
clustering scheme
discount factor
distributed cognitive radio networks
launch attacks
network scalability
operating region
reinforcement learning model
RL model
RL parameters
volatile environment
volatile operating environment
White spaces
Cognitive Radio Security
biblio
Detection Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks
Submitted by
grigby1
on Fri, 09/18/2020 - 12:56pm
pubcrawl
resilience
Resiliency
telecommunication security
Analytical models
estimation
sensors
resource management
STEM
cognitive radio
radio spectrum management
licensed primary user
emulation
primary user emulation attack
radiofrequency interference
Cognitive radio (CR) network
dynamic cognitive radio networks
free spectrum
ns2
Primary User (PU)
Primary User Emulation Attack (PUEA)
Secondary User (SUs)
spectrum access probability
spectrum scarcity problem
spectrum sensing
unlicensed secondary users
X-graph
Yardstick based Threshold Allocation (YTA)
yardstick based threshold allocation technique
Cognitive Radio Security
biblio
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency
Submitted by
grigby1
on Fri, 09/04/2020 - 2:16pm
Scalability
invasive software
resource allocation
resource management
machine learning
pubcrawl
Metrics
Resiliency
resilience
Training
learning (artificial intelligence)
Neural networks
neural nets
malware
Human Factors
neural network
control flow graphs
decoy process
decoy processes
defensive deception
flow graphs
Heating systems
heatmap training mechanism
Probes
resource utilization consistency
BIOS Security
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by
aekwall
on Mon, 08/24/2020 - 11:47am
computer network security
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
composability
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
side-channel attacks
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
load dynamics
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
1
2
3
4
5
6
next ›
last »