Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Communication Systems
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 11:42am
computer network security
network security
Resiliency
pubcrawl
composability
detection
Sybil attack
graph theory
resource management
Metrics
sybil attacks
Web sites
Relays
integer programming
Communication Systems
Approximation algorithms
Bridges
detection method
Linear programming
Bipartite graph
anonymous communication system
computer program
Distribution strategy
enumeration attacks
Integer Linear Program
minimum malicious user
resource distribution
resource distribution process
suspicious malicious users
tor anonymous communication system
tor resource distribution
biblio
ObliComm: Towards Building an Efficient Oblivious Communication System
Submitted by aekwall on Mon, 09/14/2020 - 11:27am
Servers
Receivers
security
pubcrawl
metadata
network topology
Scalability
Communication Systems
anonymous communication
horizontal scaling
modular framework
queuing theory
composability
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 9:14am
security of data
Scalability
game theory
cyber security
Resiliency
pubcrawl
component
Computational modeling
Metrics
Computer hacking
Mathematical model
probability
Information systems
Games
Human Factors
Markov processes
smart cities
Compositionality
cyber threats
Smart City
information technologies
Communication Systems
Cyber Security Systems
cybernetic risk
information security circuits
information systems smart city
likelihood of cyber threats
smart city systems
town and country planning
Cyber Dependencies
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
C language
Ciphers
Communication Systems
compute-intensive components
digital signature
digital signatures
ECC cipher
Elliptic curve cryptography
Elliptic curve cryptography (ECC)
Elliptic curves
Hardware
Hardware software codesign
hardware-software codesign
hardware-software codesign implementation
Internet of Things
IoT security
IoT Security.
Metrics
pubcrawl
public key cryptography
residue number system
residue number system (RNS)
residue number systems
resilience
Resiliency
RNS implementation
Scalability
secure data transaction
Software
Virtex-5 xc5vfx70t device based platform
Xilinx platform studio tool
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:21am
game theory
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
optimisation
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
Communication Systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
multicarrier NOMA systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
biblio
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels
Submitted by grigby1 on Tue, 02/18/2020 - 10:55am
asymmetric cache organization
asymptotic miss probabilities
asymptotic miss probability
cache miss ratios
cache storage
channel unreliability probabilities
Communication Systems
counterintuitive characteristics
counterintuitive insights
critical method
data centers
Data-Intensive Applications
data items
data placement
data replication schemes
data routing strategies
efficient cache organization
efficient data access
explicit unequal allocation policy
fast data access
fundamental method
Hash functions
LRU caching systems
Metrics
Mobile Edge Computing
Nickel
optimal distributed LRU caching
Organizations
probability
reliability theory
reliable caches
resilience
Resiliency
resource management
Scalability
separate LRU caches
single-hop multicache distributed system
single LRU cache
storage management
symmetric channels
system design
System performance
total cache space
total memory space
unreliable channels
unreliable LRU caches
Web Caching
wired Web servers
wireless content delivery networks
biblio
An Effective Swarm Optimization Based Intrusion Detection Classifier System for Cloud Computing
Submitted by aekwall on Mon, 01/27/2020 - 9:25am
ABC algorithm
Artificial Bee Colony
artificial bee colony algorithm
Artificial Intelligence
Classification algorithms
Cloud Computing
cloud computing environment
Communication Systems
composability
Compositionality
computer network security
DoS attack
effective classifier
effective swarm optimization based intrusion detection classifier system
Flooding Attack
foraging characteristics
Intrusion detection classifier
numerical problems
optimization
particle swarm optimisation
particle swarm optimization
pubcrawl
replay attack
Swarm Intelligence
Swarm intelligence algorithm
Swarm Intelligence Optimization
swarm optimization algorithms
Task Analysis
biblio
Simulating Worm Propagation in Interconnected Peer-to-Peer Networks
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
attacking networks
Communication Systems
competitive networks
fault tolerance
Grippers
Human behavior
human factor
Human Factors
interconnected networks
Mathematical model
Metrics
Peer to Peer
peer to peer security
Peer-to-peer computing
peer-to-peer network
protected network
pubcrawl
resilience
Resiliency
Safety
Scalability
security
Servers
simulation
Synapses
unprotected network
worm propagation
biblio
Cryptographic and Non-Cryptographic Network Applications and Their Optical Implementations
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
pubcrawl
composability
Protocols
Fingerprint recognition
Compositionality
Optical detectors
Optical fiber networks
quantum computing
quantum cryptography
abstract protocols
classical signal structures
Communication Systems
mere conceptual value
noncryptographic network applications
optical implementations
Optical pulses
prominent examples
quantum advantage
quantum key distribution protocols
quantum mechanical signals
Quantum mechanics
quantum optical versions
quantum optics
quantum theory
quantum version
secret keys
signal processing
theoretical cryptography
biblio
A Framework for Measurability of Security
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
Communication Systems
computer network security
data privacy
Databases
Embedded System
embedded systems
Engines
ES
expert knowledge retrieval
expert systems
experts knowledge systematic storage
Human behavior
internet
Internet of Things
Measurement
MM framework
multi metrics
Multi-Metrics
privacy
privacy and dependability evaluation complexity
pubcrawl
resilience
Resiliency
Scalability
security
security attribute
security enhancement
Security Evaluation
security function
security measurability
security metric
SPD evaluation complexity
system analysis and design
1
2
next ›
last »