Replication-based Cyber Foraging and Automated Configuration Management

نویسندگان

  • Ya-Yunn Su
  • Peter M. Chen
  • Galen Chen
  • Jessie Chou
  • Mike Chu
  • Ashlesha Joshi
  • Jinyuan Li
  • Sing-Rong Li
  • Howard Tsai
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Towards a Search-based Interactive Configuration of Cyber Physical System Product Lines

Product Line Engineering (PLE) is a technique to improve the quality and productivity of developing (via configuration) Cyber Physical Systems (CPSs). A CPS often contains many heterogeneous components with complex constraints relevant to product configuration in the context of PLE. Manual configuration is error-prone and has low productivity since managing and manipulating such constraints in ...

متن کامل

Malware in the Future? Forecasting Analyst Detection of Cyber Events

Cyber attacks endanger physical, economic, social, and political security. We use a Bayesian state space model to forecast the number of future cyber attacks. Cyber attacks were defined as malware detected by cyber analysts over seven years using cyber events (i.e., reports of malware attacks supported by evidence) at a large Computer Security Service Provider (CSSP). This CSSP protects a varie...

متن کامل

Enabling Cyber Foraging for Mobile Devices

This paper presents the LOCUSTS framework. The aim of the LOCUSTS project is to enable easy use of cyber foraging techniques when developing for small, resource-constrained devices. Cyber foraging, construed as “living off the land”, enables resource poor devices to offload tasks to nearby computing machinery, thereby enabling the small devices to 1) save energy and time, 2) take on tasks that ...

متن کامل

A Context-Based Cyber Foraging Approach to Mobile Computing Empowerment

Nowadays mobile devices are very popular and users expect to run the same applications on mobile devices as on static computers. However, these devices often have lower performance than static computers that is due to the constraints imposed on mobile devices by weight, size, and mobility. Cyber foraging approaches have tried to ameliorate the lower performance of mobile devices by exploiting m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008