Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
robots
biblio
A privacy-aware distributed software architecture for automation services in compliance with GDPR
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
privacy-aware software architecture
human-centric automation
human-machine collaboration
Law
legal regulation
legislation
Metrics
privacy
privacy breach protection
Privacy policy analysis for digital ecosystems
privacy-aware distributed software architecture
human behaviour analysis
pubcrawl
Resiliency
robots
secure communication
Security and Privacy in Digital Ecosystems
Software Architecture
virtualisation
virtualization privacy
virtualization techniques
distributed processing
authorisation
authorization
automation
automation services
Automation systems
composability
Cryptography
data breaches
Data protection
Databases
ART
distributes services
encryption
end-to-end encryption
EU citizens
factory automation
factory domain
GDPR compliance
General Data Protection Regulation
Human behavior
biblio
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training
Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
Pathfinding
White-box Q table variation
White-Box attack
White Box Security
Training
Task Analysis
security
robots
robotic automatic pathfinding application
resilience
research hotspot
representative Deep Q Network algorithm
pubcrawl
Prediction algorithms
adversarial examples
optimal path finding
Metrics
machine learning
learning (artificial intelligence)
DQN pathfinding training
DQN algorithm attack
DQN
deep reinforcement learning
countermeasure application scenario
composability
Artificial Intelligence
adversarial samples
adversarial examples construction
biblio
Modelling and evaluating failures in human-robot teaming using simulation
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
resource management
Work Models that Compute
work factor metrics
Teamwork
team working
team performance
team designers
Task Analysis
space EVA operations
Scalability
robots
robotic capabilities
robot failures
aerospace robotics
Resiliency
resilience
pubcrawl
multi-robot systems
human-robot teams
human-robot teaming
human-robot interaction
fault tolerance
failure evaluation
Extraterrestrial measurements
computational simulation
Computational modeling
biblio
Augmented Reality in Human-Robot Cooperative Search
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
navigation
Three-dimensional displays
situational awareness
Scalability
robots
robot vision
Resiliency
resilience
pubcrawl
privacy
Portable computers
augmented reality
Monitoring
mobile robots
intelligent robots
human-robot interaction
human-robot cooperative search
human teammate
Human behavior
field environments
Biomedical monitoring
biblio
Research on Cyber Crime Threats and Countermeasures about Tor Anonymous Network Based on Meek Confusion Plug-in
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
Human Factors
Web sites
Tor onion network
Tor anonymous network
robots
pubcrawl
network crime
meek plug-in
meek confusion plug-in
Intelligent systems
Computer crime
Human behavior
flow obfuscation technology
deep website
data privacy
dark website
dark web
cyber crime threats
countermeasure research
computer network security
biblio
Security risk assessment of the PeopleBot mobile robot research platform
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
Resiliency
WiFi
ubiquitous computing
Service robots
security threats
security risk assessment
security of data
security access
security
robots
robotic systems
Robot sensing systems
risk management
collision avoidance
resilience
remote accessing
remote access service
pubcrawl
PeopleBot mobile robot research platform
mobile robots
mobile robot platform
internet
Ethernet
Damage Assessment
critical missions
control
biblio
Immunity assessment of a servomotor exposed to an intentional train of RF pulses
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
intentional interference
susceptibility
smart intentional electromagnetic interference
Servomotors
servomotor
robots
robotics
RF pulses
Resiliency
resilience
radio frequency pulses
Radio frequency
pubcrawl
Off-The-Shelf servomotor
intentional train
automated production lines
industrial process
Induction motors
immunity assessment
functional safety
EMC
Electromagnetics
electromagnetic interference
electromagnetic fields
electromagnetic field
electromagnetic compatibility
DC motors
Damage Assessment
cyber-attacks
biblio
Toward experimental validation of a model for human sensorimotor learning and control in teleoperation
Submitted by el_wehby on Mon, 05/14/2018 - 4:41pm
feedback control
nonlinear dynamics
robots
teleoperation
1565529
biblio
Application of Generalized Regression Neural Network in Cloud Security Intrusion Detection
Submitted by grigby1 on Mon, 04/02/2018 - 12:39pm
Metrics
security of data
robots
Resiliency
resilience
regression analysis
pubcrawl
policy-based governance
pattern clustering
pattern classification
neural nets
network intrusion behavior modes
network intrusion
Artificial Neural Networks
learning (artificial intelligence)
Intrusion Detection
intrusion data
Intelligent systems
individual owned invasion category
Hafnium compounds
generalized regression neural network clustering analysis
generalized regression neural network
data training
clustering training samples
cloud security intrusion detection
Cloud Security
biblio
Learning composable models of parameterized skills
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
learning (artificial intelligence)
uncertainty
Training
robots
robot skills
robot programming
pubcrawl
Planning
parameterized skills
learning models
composable models
Intelligent systems
intelligent system
intelligent robots
Generators
generative planning and execution system
Explosions
control engineering computing
Compositionality
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »