Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
data centers
biblio
Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems
Submitted by grigby1 on Thu, 06/09/2022 - 2:28pm
pubcrawl
Human Factors
resilience
Resiliency
privacy
Protocols
SCADA systems
fault tolerance
Fault tolerant systems
cloud
power grids
timing
data centers
confidentiality
Byzantine Fault Tolerance
intrusion tolerance
biblio
Secure Allocation for Graph-Based Virtual Machines in Cloud Environments
Submitted by grigby1 on Thu, 05/12/2022 - 10:49am
Cryptography
Cloud Computing
machine learning
pubcrawl
Resiliency
data privacy
Topology
composability
side-channel attacks
Virtual machining
resilience
cyber physical systems
data centers
virtual machine security
virtual machine allocation
biblio
Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory
Submitted by grigby1 on Tue, 05/10/2022 - 12:53pm
quality of service
Stochastic game
prospect theory
adaptive security
ubiquitous computing
data centers
risk mitigation
Human Factors
Dynamic scheduling
Games
pubcrawl
edge computing
wireless sensor networks
privacy
Scalability
performance evaluation
Resiliency
resilience
Metrics
biblio
Anomaly Detection Based on Edge Computing Framework for AMI
Submitted by grigby1 on Thu, 05/05/2022 - 4:33pm
Metrics
KDDCUP99 datasets
edge computing framework
Deep Convolutional Neural Network (DCNN)
anomaly detetion method
Advanced Metering Infrastructure(AMI)
edge detection
data centers
Distributed databases
Image edge detection
security
composability
Computational modeling
data privacy
Data models
Scalability
Resiliency
resilience
pubcrawl
Intrusion Detection
biblio
Anomaly Detection Model of Power Grid Data Based on STL Decomposition
Submitted by grigby1 on Fri, 04/22/2022 - 1:29pm
computer architecture
Training
Cloud Computing
data analysis
Anomaly Detection
pubcrawl
Conferences
composability
Metrics
Compositionality
Semantics
automation
data centers
decomposition
data center
STL decomposition method
biblio
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments
Submitted by grigby1 on Tue, 04/19/2022 - 1:17pm
Bandwidth
Cloud Computing
data centers
Hardware
pubcrawl
Random access memory
resilience
Resiliency
Scalability
Servers
signature based defense
Virtual machining
biblio
A Network Attack Blocking Scheme Based on Threat Intelligence
Submitted by grigby1 on Tue, 04/19/2022 - 10:45am
pubcrawl
threat intelligence
Support Network Security
signal processing security
signal processing
security
SDN
Resiliency
resilience
real-time systems
Accurate Block
privacy
Metrics
Market research
machine learning
data centers
composability
Communication networks
Cloud Computing
biblio
Container-based Service State Management in Cloud Computing
Submitted by grigby1 on Mon, 03/14/2022 - 12:17pm
Cloud Computing
pubcrawl
collaboration
Heuristic algorithms
composability
Containers
sandboxing
quality of service
Policy Based Governance
Linear programming
container
checkpointing
data centers
Container Migration
service management
State Management
biblio
A simulation model of a cloud data center based on traditional networks and Software-defined network
Submitted by aekwall on Tue, 03/08/2022 - 2:41pm
information science
Topology
Mininet
information resources
GNS3
data-center
data
Communications technology
model
named data networking
Data models
data centers
Network
Human behavior
Resiliency
pubcrawl
Analytical models
SDN
Scalability
Bandwidth
biblio
Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing
Submitted by grigby1 on Thu, 02/10/2022 - 3:17pm
Distributed databases
Databases
data sensitivity
data outsourcing
data centers
cloud
Sensitivity
security
outsourcing
hybrid data partitioning
encryption
1
2
3
4
5
next ›
last »