Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems
Submitted by grigby1 on Mon, 12/30/2019 - 1:22pm
internet
tamper detection observer
slave-to-master paths
slave sides
slave robots
security of data
secure interactive networked control systems
robots
Resiliency
resilience
pubcrawl
position control
networked control systems
mitigation method
master-to-slave paths
Acceleration
Human behavior
Force
false data injection attacks
False Data Detection
delays
Delay effects
Cybersecurity
cyber physical systems
control systems
control engineering computing
composability
Communication channels
bilateral teleoperation systems
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 1:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
DDoS Botnet Prevention Using Blockchain in Software Defined Internet of Things
Submitted by grigby1 on Wed, 12/18/2019 - 1:47pm
distributed blockchain
telecommunication security
software defined networking
software defined Internet of Things
SDN
Resiliency
resilience
pubcrawl
Metrics
invasive software
Internet of Things
Human behavior
Force
distributed denial of service attacks
botnets
defense perspectives
DDoS botnet prevention
DDoS Attack Prevention
DDoS
control center
computer network security
Computer crime
composability
botnet prevention system
botnet bondage
botnet
blockchain
bitcoin
biblio
The positive force of deterrence: Estimating the quantitative effects of target shifting
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
counter piracy
Terrorism
target shifting
stopping performance
Radiation detectors
low performance security
game theoretic approach
force multiplier
Force measurement
false alarm
deterrence force
counterterrorism
security of data
Deterrence
risk analysis
protection system
resilience
uncertainty
Force
pubcrawl
Human behavior
game theory
Scalability
biblio
Development and Validation of Numerical Magnetic Force and Torque Model for Magnetically Levitated Actuator
Submitted by aekwall on Mon, 09/30/2019 - 9:08am
magnetically levitated actuator (MLA)
torque model
torque control
Torque
Resiliency
remanence region
remanence
pubcrawl
numerical wrench model
Numerical models
numerical magnetic force and torque model
multiaxis motion
motion decoupling
motion control
MLA
Magnetomechanical effects
actuators
magnetically levitated actuator
magnetic levitation
Magnetic forces
Magnetic flux
Magnetic and coil nodes
Lorentz integral
harmonic model
Gaussian quadrature
Gaussian processes
Force
coordinate transformation
composability
Coils
coil region
biblio
Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools
Submitted by grigby1 on Thu, 03/28/2019 - 2:12pm
password
tools
text-based authentication mechanisms
situational awareness
Resiliency
resilience
pubcrawl
password security policies
password cracking tools
password cracking
password auditing tools
password auditing policy
password auditing
auditing results
Organizations
next-generation password auditing toolkits
Metrics
Guidelines
Force
Dictionaries
cyber situational awareness
cyber security
cyber defence toolkits
composability
authorisation
biblio
A Self-organized Shape Formation Method for Swarm Controlling
Submitted by aekwall on Thu, 02/21/2019 - 12:02pm
multi-robot systems
swarm robots
Swarm Intelligence
swarm controlling
standards
simulation
shape formation
shape control
Shape
self-organized shape formation method
Robustness
repulsive force field
pubcrawl
artificial method
mobile robots
line shapes
Force
distributed calculation
distance image
convergence
composability
complex behaviors
collision avoidance
attraction field
artificial potential fields
biblio
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Submitted by grigby1 on Fri, 02/08/2019 - 3:38pm
Linux
SSH service attack
SSH honeypot architecture
Software Architecture
Servers
secure shell honeypot
secure shell
Scalability
Resiliency
resilience
pubcrawl
port knocking
operating systems
authentication
kippo honeypot
IP networks
intrusion detection system
IDS
Human Factors
Human behavior
honeypot
honey pots
Force
computer network security
Computer crime
biblio
Parallel Reconstruction of Three Dimensional Magnetohydrodynamic Equilibria in Plasma Confinement Devices
Submitted by grigby1 on Thu, 08/23/2018 - 10:59am
plasma equilibria
tokamaks
Tokamak devices
Three-dimensional displays
three dimensional plasma reconstruction code
three dimensional plasma equilibrium reconstructions
three dimensional magnetohydrodynamic equilibria
stellarators
Resiliency
resilience
pubcrawl
privacy
plasma toroidal confinement
plasma simulation
plasma magnetohydrodynamics
composability
plasma confinement devices
parallel V3FIT
parallel reconstruction
parallel algorithms
Nickel
Mathematical model
Magnetohydrodynamics
fusion data
formal analysis
Force
data parallelism
cyber-physical systems
Cray XC30 supercomputer
confinement
biblio
Evolutionary strategy approach for improved in-flight control learning in a simulated Insect-Scale Flapping-Wing Micro Air Vehicle
Submitted by el_wehby on Thu, 05/17/2018 - 5:52pm
FW-MAV
wing-level oscillation patterns
wing motion patterns
wing damage
vehicles
Statistics
Space vehicles
Sociology
simulated insect-scale flapping wing micro air vehicle
Oscillators
oscillator learning algorithms
online learning
online evolutionary algorithm
learning (artificial intelligence)
in-flight control learning
genomics
Adaptive Hardware
Force
flight controller
Flapping-Wing Micro-Air Vehicle
evolutionary strategy
evolutionary computation
Evolutionary algorithm
evolution strategy
ES
EA
correct flight behavior
bioinformatics
automated methods
aerospace control
aerospace components
1239196
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »