Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military computing
biblio
The importance of cyber security education in digitalization and Banking
Submitted by grigby1 on Fri, 06/09/2023 - 1:16pm
Government
Vulnerable Digital
Internet safety
policy governance
Human Factors
Cybercrime
military computing
Cyberspace
education
cybersecurity education
pubcrawl
cyber-attacks
resilience
Complexity theory
composability
Computers
internet
Scalability
Resiliency
Human behavior
biblio
Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things
Submitted by grigby1 on Fri, 02/24/2023 - 3:46pm
pubcrawl
Resiliency
Scalability
authentication
internet
Protocols
telecommunication traffic
real-time systems
SDN
resilience
iobt
military computing
Human Factors
Behavioral sciences
Behavior-based Authentication
Network Traffic Management
biblio
SoK: Cryptojacking Malware
Submitted by grigby1 on Tue, 07/12/2022 - 2:09pm
Systematics
in-browser
Host-based
blockchains
Pandemics
detection
bitcoin
cryptomining
cryptojacking
military computing
tools
resilience
Metrics
blockchain
malware
Industries
Resiliency
Human behavior
pubcrawl
biblio
Quantum Computing for Military Applications
Submitted by aekwall on Fri, 04/01/2022 - 1:06pm
Logic gates
machine learning
military computing
pubcrawl
Resiliency
Compositionality
Predictive Metrics
quantum computing
Computers
annealing
military applications
Quantum mechanics
Qubit
use cases
Scientific Computing Security
biblio
Modulated Signal Recognition Based on Feature-Multiplexed Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/01/2022 - 3:25pm
convolutional neural networks
deep learning
fault tolerance
Fault tolerant systems
feature extraction
feature reuse
military computing
modulated signal recognition
Network reconnaissance
pubcrawl
Reconnaissance
Regulation
resilience
Resiliency
Scalability
biblio
Moving Target Defense for Space Systems
Submitted by grigby1 on Tue, 02/22/2022 - 4:46pm
MILSTD-1553
Protocols
Computers
real-time systems
Measurement
Cybersecurity
cyber resilience
moving target defense
military computing
intelligent system scrambling
Scalability
real-time network security
critical infrastructure
machine learning
pubcrawl
Metrics
resilience
Resiliency
Conferences
biblio
Structure and Key Technologies of Wireless Sensor Network
Submitted by grigby1 on Mon, 11/08/2021 - 12:33pm
pubcrawl
composability
Human behavior
location awareness
Metrics
military computing
Monitoring
node
Positioning
Communication system security
resilience
Resiliency
sensors
sensor security
target tracking
Wireless communication
Wireless Sensor Network
wireless sensor networks
biblio
Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation
Submitted by aekwall on Wed, 07/07/2021 - 3:46pm
secure communication
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
ubiquitous computing
Smart Home
Smart City
security
Mobile wireless sensor networks
mobile ad hoc networks
military computing
Games
data privacy
wireless sensor networks
Human Factors
Monitoring
biblio
Experiment Design for Complex Immersive Visualisation
Submitted by grigby1 on Wed, 02/03/2021 - 12:11pm
Information systems
visualisation
tools
software performance
resilience
pubcrawl
privacy
network forensics
military computing
military communication
immersive systems
Human Factors
human computer interaction
Human behavior
Data visualization
data analysis
cyber warfare
cyber physical systems
composability
biblio
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
Submitted by grigby1 on Thu, 01/28/2021 - 12:13pm
Metrics
tools
stealthy attackers
Scalability
Resiliency
resilience
Reconnaissance
quantitative framework
pubcrawl
persistent cyber adversaries
passive reconnaissance techniques
Organizations
network reconnaissance capabilities
model reconnaissance
military computing
Network reconnaissance
Knowledge engineering
Human behavior
foothold
Electronic mail
defensive capabilities
deception-based defenses
cyber deception
critical capability
Computer worms
computer network security
Computer crime
Adversary Models
advanced adversaries
1
2
3
4
5
6
7
next ›
last »