Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Index > O - Pg. 806

806 Index NIST (National Institute of Standards and Technology), 647­648 NLP (Neighbor Location Protocol), 172 NOC (network operation center), 456­457 node compromise detection (WSNs), 281­298 framework, 282 group deployment strategy, 285­286 introduction to, 281­282 keying materials extraction, 281 limited node compromises, 282­284, 289­292 preliminaries, 285­289 random mobility model (RWM), 288­289 related work, 282­285 replica schemes, 282 sequential probability ratio test (SPRT), 286­288 wide-spread node compromises, 282, 284­285, 292­298 non-central chi-square distribution, 206 non-communicating servers confidentiality constraints, 371 data organization, 372­374 fragmentation in, 373 query execution, 374­375 query translation in, 375 noncooperative game theory, 35­36 nonlinear queueing models, 18 North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP), 647 NSPSL (Network Security Policy Specification Language), 605 NTM (network threat monitoring), 83 Loco toolkit, 340­341 research, 340­341 trade-off, 337 transform classes, 337 observability test, 21 OCEAN, 179 OFDM (Orthogonal Frequency-Division Multiplexing), 119 OLS (Overlay Location Service), 745­746 on-board diagnostics II (OBD-II), 662 code sniffing protection via, 669 code tampering protection via, 669­671 communication protocols, 662 pin descriptions, 663 on-demand revocation, 694­696 one-to-one relabeling scheme, 441 online decentralized event detection, 539­540 defined, 539 density estimation, 539­540 equations, 539 online social networks (OSNs) complete disclosure of user identity, 445­447 growth of, 431 partially exposing user identity, 442­445 privacy preservation measures, 448 relation privacy preservation in, 431­449 user identity anonymization, 433­442 utility loss, 447 online threshold estimation, 540 on-the-fly decryption, 671­673 protection, 673 reprogramming procedures for, 673 sequence diagram, 672 Open Smart Grid (OpenSG), 647, 649 Open Virtualization Format (OVF), 726 OpenVoIP, 786, 787 optimization problems, 140­141 order preserving encryption indexes, 365 Order Preserving Encryption Schema (OPES), 365 Order Preserving Encryption with Splitting and Scaling (OPESS), 365 ordered binary decision diagrams (OBDDs), 619, 625­627 Orion DBMS, 588 Orthogonal Frequency-Division Multiplexing (OFDM), 119 network dynamics (continued) global statistics, 8 inference of, 6 information violation of, 6 physical, 5 robustness/vulnerability of, 6 state, 7 state-space differential equation modeling, 8­9 network estimation dynamics of, 6 graph-theoretic studies of, 19 initial-condition, 20­21 spectrum, 21­22 steady-state probability, 21 network estimation tools, 7, 19­22 defined, 19 initial-condition estimation, 20­21 spectrum estimation, 21­22 steady-state probability estimation, 21 network graph example, 8­9 network inference, 5 Network Ontology (NetOnto), 566 network operation center (NOC), 456­457 network partitioning based on sparse and noisy measurement, 26 clusters, 26 decentralized, 26 with influence model, 27­28 methods, 7 network partitioning tools approaches, 26 defined, 19 Network Security Policy Specification Language (NSPSL), 605 network threat monitoring (NTM), 83 network-based detection, 74 network-based IDSs, 174, 175 networked cyber-physical spaces (NCPS) defined, 510 system control and optimization, 512 network-wide flooding, 746 n-gram analysis, 468­473 buckets, 469 defined, 468 frequency, 469 group test, 469, 470, 473 sliding window model, 469 test() operation, 470, 471 verification data structures, 471 NHIN (Nationwide Health Information Network), 688­689 O OBDDs (ordered binary decision diagrams), 619, 625­627 obfuscation abstraction transformations, 337 applications, 337 compiler techniques for, 336­341 control transformations, 337, 338­339 data transformations, 337­338 defined, 336­337 detection avoidance, 341 dynamic transformations, 337, 339­340 example, 339 fingerprint extraction, 341 Heap Server, 343 Huffman trees, 341