Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
Anomaly Detection on Bipartite Graphs for Cyber Situational Awareness and Threat Detection
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
Anomaly Detection
Bipartite graph
composability
cyber security
Force
graph analytics
IP networks
Layout
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Servers
situational awareness
biblio
Behavior of the oscillating microbubble clusters trapped in focused ultrasound field
Submitted by grigby1 on Wed, 12/20/2017 - 7:50pm
Sonazoid cluster size
oscillating behaviors
oscillating microbubble clusters
pubcrawl
Resiliency
Resonant frequency
shelled bubble
size 1.5 mum
size 2.6 mum
microbubble
Transducers
ultrasonic imaging
ultrasonic therapy
ultrasound drug delivery system
ultrasound frequency
ultrasound imaging
Viscosity
drug delivery systems
biomedical ultrasonics
bubble cluster
bubble clusters
bubble parameters
bubbles
cavitation
composability
diseases
Acoustics
focused ultrasound
focused ultrasound field
Force
free interface bubble cluster theory
high-number density
Lipidomics
Metrics
biblio
A hopping sensor deployment scheme based on virtual forces
Submitted by grigby1 on Wed, 03/08/2017 - 12:54pm
maximal coverage optimization problem
wireless sensor networks
Wireless Sensor Network
Voronoi neighbor sensor
virtual force algorithm enhancement
telecommunication power management
Robot sensing systems
pubcrawl170110
optimization
mobile sensor continuous dynamics
Mobile communication
dynamics
local Voronoi cell centroid
hopping sensor dynamics equation
hopping sensor discrete dynamics
hopping sensor deployment scheme
hopping sensor constraint dynamics
Heuristic algorithms
Force
energy efficient hopping sensor
energy conservation
biblio
The rules of engagement for cyber-warfare and the Tallinn Manual: A case study
Submitted by BrandonB on Mon, 05/04/2015 - 1:40pm
Force
Tallinn Manual
standards
security of data
Protocols
Organizations
Manuals
Law
international law
Computer crime
cyber-warfare
Cyber-Terrorism
cyber-sabaotge
cyber-espionage
cyber-attacks
Cooperative Cyber Defence Centre of Excellence
Computers
biblio
Challenges pertaining to cyber war under international law
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
Force
Tallinn Manual
Stuxnet
state-level cyber intrusion
security of data
Manuals
legal position
Law
international law
challenges
Estonia
cyberspace state-level intrusion
cyberspace intrusion
cyberspace governance
Cyberspace
cyber war
Computer crime
biblio
The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface
Submitted by BrandonB on Thu, 04/30/2015 - 12:39pm
Force
cyber environment
deception
decision maker
Decision Making
C4ISR interface attacking
combat
command and control
command and control systems
cyber attack
cyber deception
Aircraft
information network attack
kinetic deception
Kinetic theory
operational effect
risk management
security of data
sensors
surveillance
Synchronization
trust
« first
‹ previous
…
2
3
4
5
6
7
8
9
10