Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Prototypes
biblio
Wearable Sensor of Humanoid Robot-Based Textile Chemical Sensors for Odor Detection and Tracking
Submitted by grigby1 on Tue, 12/15/2020 - 12:42pm
Textiles chemical sensors
pubcrawl
resilience
Resiliency
robot operating systems
Robot sensing systems
security
security component
Sensitivity
smart clothes
smart shoes
Textiles
Prototypes
umanoid robot
VOCs
Volatile biomarkers
wearable humanoid robot-based textile chemical sensors
wearable personal gas leakage detection
wearable personal safety
wearable pocket toxic-gas detector
wearable sensor
wearable wellness platform
ZigBee wireless communication technology
Humanoid robots
Biomedical monitoring
C
carbon nanotubes
data acquisition
data monitoring system
gas sensors
Human axillary odor detection
human axillary odor monitoring
Human behavior
Human Factors
human foot odor tracking
ammonia
leak detection
nanocomposites
nanosensors
NH3 leakage detection
odor biomarker
odor tracking
odorant detection system
policy-based governance
polymer-CNT nanocomposite gas sensors
polymers
biblio
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge Computing
Submitted by grigby1 on Wed, 12/02/2020 - 1:03pm
response latency
Logic gates
mobility management (mobile radio)
next generation automotive edge computing
next generation networks
next-generation intelligent transportation system
Prototypes
pubcrawl
resilience
Resiliency
local edge server
road traffic
Scalability
Servers
synchronisation
telecommunication control
telecommunication traffic
traffic accidents
traffic engineering computing
vehicle dynamics
data traffic
5G mobile communication
5G networks
central cloud-based approach
central server
Cloud Computing
computer architecture
control and user plane separation
coupled congestion control
CUPS
5G
Dynamic mapping
dynamic mapping traffic
edge computing
edge computing architecture
edge servers
global dynamic mapping information
Intelligent Transportation Systems
Internet of Things
IoT
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
Look Inside: Understanding Thermal Flux Through Augmented Reality
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
perception gap
virtual reality environment
university dropout rate
thermal flux
science technology engineering mathematics field
Scalability
resilience
real-time systems
real-time augmentation
pubcrawl
Prototypes
privacy
Physics computing
Physics
attention split
mixed reality application
learning material
Human behavior
high school
Heating systems
H.5.m [Information Interfaces and Presentation]: Miscellaneous
false-color visualization
engineering education
Data visualization
data visualisation
computer aided instruction
augmented reality environment
augmented reality
biblio
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
connected car systems
automotive electronics
controller area networks
automotive cybersecurity tests
automotive engineers
automotive field
automotive security tooling
black-box fuzz testing
CAN fuzz testing example
fuzzing
controller area network fuzz testing
cybersecurity testing
dynamic security test
dynamic software testing
Fuzz Testing
laboratory vehicle
SAE J3061
secure-by-design
pubcrawl
security of data
Internet of Things
security
Protocols
Software
embedded systems
cyber-physical systems
Resiliency
Automotive engineering
program testing
system security
program debugging
Prototypes
controller area network
black-box testing
controller area network security
automobiles
biblio
An application of Li-Fi based Wireless Communication System using Visible Light Communication
Submitted by aekwall on Mon, 07/13/2020 - 10:17am
Arduino Uno
Fluctuations
light emitting diodes
Light emitting diodes (LEDs)
light fidelity
Light Fidelity or Li-Fi system
Metrics
Prototypes
pubcrawl
Receivers
Resiliency
Scalability
Visual Light Communications Security
VLC
Wireless communication
Wireless fidelity
biblio
Code-based Pseudorandom Generator for the Post-Quantum Period
Submitted by grigby1 on Fri, 04/03/2020 - 11:56am
“Provable”
resilience
security model
Resistance
Random sequences
Periodic Properties
Fischer-Stern Generator
Cryptographically Resistance Pseudorandom Sequences
Code-based Pseudorandom Number Generator
pubcrawl
provable security
Compositionality
Decoding
Metrics
Prototypes
Cryptography
Generators
Resiliency
biblio
Prototype Container-Based Platform for Extreme Quantum Computing Algorithm Development
Submitted by aekwall on Mon, 03/30/2020 - 10:41am
Docker container environment
quantum computing security
rapid prototype development
quantum simulators
quantum computing hardware platforms
quantum computing devices
quantum computing algorithm development
quantum computer
Qiskit source codes
prototype environment
prototype container-based platform
prototype container system
prototype container based system
IBM Q Experience Web site
IBM Q Experience
Docker Containers
Cloud Computing
computer security challenges
cloud computing system
cloud computing software environment
Prototypes
Predictive Metrics
quantum computing
Containers
source code (software)
Libraries
composability
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 2:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
SystemC VP
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
scalable verification
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
Scalability
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Hardware
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »