Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
robots
biblio
Defending Web Servers with Feints, Distraction and Obfuscation
Submitted by grigby1 on Fri, 05/15/2020 - 12:00pm
internet
Web servers
security strategies
Scalability
robots
Resiliency
resilience
reconnaissance process
Reconnaissance
pubcrawl
Network reconnaissance
IP networks
Computer crime
honeytokens
file servers
delays
delay strategies
deceptive defense strategies
deceptive counter measure abilities
deception based information security
Databases
cyber threat landscape
computer network security
biblio
Reconfigurable Colloidal Microrobotic Swarm for Targeted Delivery
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
Resiliency
oscillating behaviors
paramagnetic nanoparticles
potential biomedical applications
privacy
pubcrawl
real-time systems
real-time tracking
reconfigurable colloidal microrobotic swarm
resilience
nanoparticles
robots
rotating magnetic fields
size 400.0 nm
swarm
swarming patterns
swarms exhibits out-of-equilibrium structure
targeted delivery
tuning
untethered microrobots
magnetic resonance imaging
Coils
collective behaviour
composability
controlled velocity
drug delivery systems
external fields
external magnetic fields
magnetic actuation
Magnetic Particles
applied fields
Metrics
Microorganisms
microrobot
microrobotic swarm behaviours
microrobotic swarms
microrobots
multi-robot systems
nanomagnetics
biblio
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
Submitted by aekwall on Mon, 04/13/2020 - 10:14am
ROS
SIEM
security event management system
SDN-based security policy enforcement
ROSDefender
ROS-Defender
robotics systems
robotics
Robotic system
OpenvSwitch
IPS
dynamic policy enforcement points
anomaly detection systems
intrusion prevention system
robotic applications
computer network security
robots
Robot sensing systems
security policies
SDN
Peer-to-peer computing
policy-based governance
pubcrawl
software defined networking
Linux
security
Access Control
Servers
firewall
biblio
Heuristics-Based Multi-Agent Task Allocation for Resilient Operations
Submitted by aekwall on Mon, 03/09/2020 - 11:12am
pre-requisite
Markovian assumptions
Markovian state information
modeling probabilistic failure
natural world
navigation
nonMarkovian setting
nonMarkovian state modeling
novel heuristic
intelligent task assignment
real-world systems
realistic state
rescue robots
resilient operations
SAR
uncertainty modeling
Security Heuristics
predictability
Probabilistic logic
Task Analysis
Resiliency
pubcrawl
resource management
multi-robot systems
multi-agent systems
robots
uncertainty
Scalability
Markov processes
Linear programming
agent failure
complex environments
heuristics-based multiagent task allocation
imulated search and rescue mission
inherent challenges
biblio
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
low-end control units
telecommunication security
security issues
secret keys
Scalability
robots
robotic applications
Resiliency
pubcrawl
private key cryptography
network security
mobile robots
message authentication
automobiles
lightweight cryptography
Lightweight Ciphers
Lightweight Cipher
lightweight authentication
hardware based individual keys
Hardware
firmware
Ciphers
Autonomous Driving
Automotive engineering
Automotive Device Authentication
automotive applications
biblio
ROS-based Robot Development Toward Fully Automated Network Management
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
pubcrawl
Temperature sensors
softwarelization technologies
Software
Servers
SDN
ROS-based robot development
ROS
robots
Robot sensing systems
Robot Operating System
Robot
Resiliency
automation
operating systems (computers)
NFV transfers
network management
Monitoring
fully automated network management robot
expandability
environmental monitoring
cyber-physical world
control engineering computing
composability
commercial network center
biblio
Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
internet
tamper detection observer
slave-to-master paths
slave sides
slave robots
security of data
secure interactive networked control systems
robots
Resiliency
resilience
pubcrawl
position control
networked control systems
mitigation method
master-to-slave paths
Acceleration
Human behavior
Force
false data injection attacks
False Data Detection
delays
Delay effects
Cybersecurity
cyber physical systems
control systems
control engineering computing
composability
Communication channels
bilateral teleoperation systems
biblio
Common Metrics to Benchmark Human-Machine Teams (HMT): A Review
Submitted by Katie Dey on Fri, 09/13/2019 - 11:35am
Task Analysis
robotics
Metrics
human-machine teaming (HMT)
Human Factors
Benchmarking
autonomous system
robots
computer architecture
collaboration
Benchmark testing
human computer interaction
Measurement
benchmark HMT
Performance Metrics
metric classification
metric identification
human-machine teaming
benchmark human-machine teams
team working
pattern classification
Man-machine systems
Human Machine Teaming
C3E 2019
biblio
A Survey of Multi-Agent System Approach in Risk Assessment
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
dynamic risk assessment field
Supply Chain Risk Assesment
static risk
software agents
robots
risk assessment
multiagent systems
multiagent system approach
MAS
Fires
computer architecture
dynamic risk
DRA
decision-making
supply chains
risk management
multi-agent systems
Metrics
pubcrawl
biblio
A Malicious Attack on the Machine Learning Policy of a Robotic System
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
machine learning algorithms
security of data
robots
robotics
robotic vehicle
Robotic system
Resiliency
real-time routing control
radiofrequency identification
Q learning algorithm
pubcrawl
mobile robots
Metrics
malicious attack
machine learning policy
robot operating systems
machine learning
learning (artificial intelligence)
intelligent robots
indirect attack
Human behavior
Cybersecurity
cyberattack
composability
autonomous vehicles
autonomous vehicle
artificial intelligence security
Artificial Intelligence
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »