Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Weapons
biblio
Neural Network and ROS based Threat Detection and Patrolling Assistance
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
Robot vision systems
operating systems (computers)
patrolling assistance
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System
robot operating systems
robot vision
object detection
robotic automation
ROS based threat detection
security
Service robots
Software Architecture
software architecture design
Weapons
YOLO
ergonomics
autonomously moving bots
Cameras
computer architecture
computer vision
computer vision algorithms
control engineering computing
convolutional neural networks
daily ergonomics
autonomous navigation
hardware components
Human behavior
Human Factors
Lasers
mobile robots
navigation
neural nets
neural network
biblio
Multi-Domain Effects and the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
MDO effect loop decision process
Weapons
Task Analysis
sensors
Scalability
Radar
pubcrawl
multidomain operating environment
multidomain effects
Multi-Domain Operations (MDO)
military effects
military computing
Artificial Intelligence
IoBT effects
iobt
Internet of Things (IoT)
Internet of Things
Internet of battlefield things
Human Factors
effects
decision-making
Decision Making
decision frameworks
contemporary military decision-processes
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
Mission Resilience for Future Army Tactical Networks
Submitted by grigby1 on Tue, 10/06/2020 - 1:10pm
Mission critical systems
Weapons
traditional engineering methods
Task Analysis
tactical network architectures
tactical network
tactical forces
Streaming media
sensors
Resiliency
resilience
pubcrawl
psychometric
network architecture
mission resilience metrics
mission essential functions
autonomous vehicles
Mission Assurance
mission
military operations
military communication
Measurement
future army tactical networks
cyber-physical systems
cyber resilience metrics
cyber physical systems
Cyber Physical System
cyber assets
CPS resilience
command and control systems
battlefield operations
biblio
Markov Models of Cyber Kill Chains with Iterations
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
Information systems
Weapons
targeted cyber-attack processes
targeted cyber attacks
stochastic models
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
Markov processes
Markov Models
Chained Attacks
homogeneous continuous time Markov chains
homogeneous continuous time Markov chain
cyber-attacks life cycles
cyber-attack process
cyber-attack life cycle
cyber-attack kill chains
cyber threats
cyber kill chains bases
cyber kill chain with iterations
command and control systems
biblio
Identification of Darknet Markets’ Bitcoin Addresses by Voting Per-address Classification Results
Submitted by grigby1 on Fri, 09/04/2020 - 2:58pm
bitcoin security
Weapons
voting per-address classification
security forensics aspect
Measurement
law enforcement
illegal products
forensic
DNM
decentralized digital currency
darknet markets
common ledger
classification
Bitcoin transactions
data privacy
financial data processing
bitcoin
drugs
Distributed databases
Roads
cryptocurrencies
blockchain
Human behavior
pubcrawl
machine learning
feature extraction
Scalability
biblio
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
cyberattack
APT attack
Weapons
weaponization movement
strategy decision-making
mathematical framework
lateral movement
internal network
intelligence gathering
initial entry model
information-based APT attack
information-based advanced persistent threat attack
IEL
defense mechanism ineffective
pubcrawl
Reconnaissance
Silicon
APT
advanced persistent threat
Metrics
invasive software
Decision Making
Scalability
Mathematical model
computer network security
Resiliency
resilience
Human behavior
biblio
Dark Web Along With The Dark Web Marketing And Surveillance
Submitted by grigby1 on Fri, 07/10/2020 - 10:54am
Human behavior
WebMarketing
Web sites
Weapons
Terrorism
terror activities
surveillance programs
surveillance
pubcrawl
law enforcement agencies
law enforcement
invasive software
internet
Human Factors
Computer crime
drugs
darkweb
dark Web sites
dark Web marketing
dark Web jihadist services
dark web
Daniel onion.
cybercrimes
cyber criminals
criminal law
Conferences
Computer hacking
biblio
AI Based Automatic Robbery/Theft Detection using Smart Surveillance in Banks
Submitted by grigby1 on Fri, 07/03/2020 - 12:16pm
smart surveillance
Proposals
pubcrawl
real-time analysis
real-time systems
resilience
Resiliency
Scalability
security
object detection
surveillance
surveillance systems
theft-detection
video signal processing
video surveillance
video-analysis
Videos
Weapons
deep learning
artificial-intelligence
Banking
CCTV based theft detection
CCTV footage
closed circuit television
computer vision
computer-vision
Conferences
Artificial Intelligence
deep video
deeplearning
dramatic efficiency gains
human supervision
learning (artificial intelligence)
Metrics
multimedia content analysis
neural nets
biblio
Towards establishment of cyberspace deterrence strategy
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
civilian defense strategists
Weapons
strategy
social aspects of automation
National security
military security
first-strike
cyberspace deterrence strategy
cyberdeterrence
cyberattacks
credible declaratory retaliation capability
counter-strike
confidentiality
security of data
Deterrence
military computing
Cyberspace
resilience
Information systems
Availability
integrity
Economics
pubcrawl
Human behavior
Scalability
Computer crime
« first
‹ previous
1
2
3
4
5
next ›
last »