Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
A Proof of Concept Denial of Service Attack Against Bluetooth IoT Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
wireless LAN
bluetooth security
study Bluetooth security
study Bluetooth device security
proof-of-concept DoS attack
operation necessitates special hardware
frequency-hoping spread spectrum technique
forming ad hoc networks
device-to-device communications
concept denial
Bluetooth technologies
Bluetooth IoT devices
Bluetooth devices security
denial of service
wireless networks
human computer interaction
tools
Ad hoc networks
composability
standards
personal area networks
Protocols
telecommunication security
Software
computer network security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
security
Internet of Things
biblio
Cyber Security Assessment of the Robot Operating System 2 for Aerial Networks
Submitted by grigby1 on Thu, 12/17/2020 - 1:36pm
robot programming
military-centric robotics platform
mobile robots
operating systems (computers)
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System 2
robot operating systems
military systems
robotic middleware
robots
ROS
ROS 1 security vulnerabilities
ROS 2
security
standards
UAV swarms
unmanned Naval aerial swarms
DDS standard
authentication
autonomous aerial vehicles
autonomous systems
control engineering computing
Cryptography
cyber security
cyber security assessment
Data Distribution Service standard
DDS security architecture
aerial networks
drones
encryption
GCS
ground control station
Human behavior
Human Factors
middleware
military computing
military grade unmanned systems
biblio
SDN-based Misbehavior Detection System for Vehicular Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
sybil attacks
vehicular privacy standards
Sybil attack-resistant
Software-Defined Networking paradigm
SDN-based misbehavior Detection system
misbehavior detection systems
Misbehaving Detection Systems
cryptography solutions
context-aware MDS
voting
internal attacks
vehicular networks
Software Defined Networks
standards
computer network security
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Resiliency
software defined networking
Software
security
data privacy
Cryptography
Monitoring
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
Application research and improvement of particle swarm optimization algorithm
Submitted by aekwall on Mon, 12/14/2020 - 12:39pm
PSO
multiobjective optimization
local optimization
Application research
Swarm intelligence algorithm
Compositionality
Improvement
Heuristic algorithms
Statistics
Sociology
pubcrawl
particle swarm optimization algorithm
particle swarm optimization
optimization
standards
Swarm Intelligence
particle swarm optimisation
convergence
composability
biblio
Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
UAVs
value-added services
standardisation
standard gap analysis
solid technical foundation
security-critical data
security-critical
regulatory foundation
quality living
optimised management
mobile IoT devices
Gap Analysis
data-driven systems
Data Protection and Privacy
Unmanned Aerial Vehicles
data privacy
autonomous aerial vehicles
interoperability
trustworthiness
Energy Efficiency
Data protection
standards
composability
pubcrawl
Trusted Computing
Protocols
privacy-sensitive data
security
Internet of Things
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 4:37pm
GPU-based approach
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
parallel algorithms
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
data structures
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
feature extraction
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
biblio
Joint Bidding and Geographical Load Balancing for Datacenters: Is Uncertainty a Blessing or a Curse?
Submitted by grigby1 on Tue, 12/01/2020 - 4:36pm
real-time systems
joint electricity procurement
Linear programming
Load management
market prices
Metrics
multiple geo
Policy Based Governance
price uncertainty
Pricing
Procurement
pubcrawl
joint bidding
realistic setting
resilience
Resiliency
resource allocation
Scalability
standards
strategic bidding
total electricity
uncertainty
wholesale markets
workloads
datacenters
bidding curve
Cloud Computing
cloud service provider
collaboration
composability
computer centres
convex programming
cost reduction
cost-saving performance
CSP
data centers
bandwidth cost
deregulated electricity market
Electricity supply industry
Geographic load balancing
geographical load balancing
GLB
Human behavior
Human Factors
IEEE transactions
Internet-scale Computing Security
Internet-scale service
biblio
How Humans Develop Trust in Communication Robots: A Phased Model Based on Interpersonal Trust
Submitted by grigby1 on Tue, 12/01/2020 - 1:22pm
pubcrawl
trust development
trust
standards
social robots
social robot
Social psychology
Service robots
self-esteem
robust trust
Robot Trust
Resiliency
resilience
communication robot
psychology
Presses
phased model
interpersonal trust
Humanoid robots
human-robot interaction
Human Factors
Human behavior
general category trust
Educational robots
Economics
communication robot NAO
biblio
Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
Data mining
trust-aware threat intelligence sharing platform
trust-aware intelligence architecture model
TISP
intelligence feature extraction
heterogeneous threat intelligence
GTTI
graph mining
cyber threat intelligence sharing platforms
human trust
Human behavior
trust evaluation mechanism
trust evaluation
security of data
Data protection
Databases
standards
graph theory
pubcrawl
feature extraction
Trusted Computing
security
malware
Organizations
IP networks
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »