Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military computing
biblio
Cyber Security Assessment of the Robot Operating System 2 for Aerial Networks
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
robot programming
military-centric robotics platform
mobile robots
operating systems (computers)
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System 2
robot operating systems
military systems
robotic middleware
robots
ROS
ROS 1 security vulnerabilities
ROS 2
security
standards
UAV swarms
unmanned Naval aerial swarms
DDS standard
authentication
autonomous aerial vehicles
autonomous systems
control engineering computing
Cryptography
cyber security
cyber security assessment
Data Distribution Service standard
DDS security architecture
aerial networks
drones
encryption
GCS
ground control station
Human behavior
Human Factors
middleware
military computing
military grade unmanned systems
biblio
Military Surveillance Robot Implementation Using Robot Operating System
Submitted by grigby1 on Tue, 12/15/2020 - 12:41pm
mobile robots
surveillance
security
robotics
robot operating systems
Robot Operating System
Resiliency
resilience
pubcrawl
policy-based governance
Neural networks
3D visualization
military systems
military surveillance robot
military computing
Kinect sensor
image sensors
Human Factors
Human behavior
control engineering computing
computer vision
biblio
Software Defined Multi-Path TCP Solution for Mobile Wireless Tactical Networks
Submitted by grigby1 on Wed, 12/02/2020 - 12:54pm
software defined multipath TCP solution
relay networks (telecommunication)
relay points
resilience
Resiliency
satellite communication system
satellite failure
Satellites
Scalability
service interruption
shore nodes
single link failure
single-path model
single-path TCP communication methods
pubcrawl
software defined networking
software-defined networking
source node movements
stable network handovers
tactical networks
TCP connectivity
telecommunication network reliability
transport protocols
Unmanned Aerial Vehicles
wireless
Wireless communication
wireless network technologies
wireless signal outage
mobile wireless heterogeneous networks
Bandwidth
communication interruption
communication model
connectable relay point
control systems
coupled congestion control
frequent network handovers
inherent mobility
Marine vehicles
military communication
military computing
Mininet-WiFi emulation testbed
mobile
autonomous aerial vehicles
mobile wireless tactical networks
mobility management (mobile radio)
Multi-Path TCP
multipath channels
naval battle networks
Naval Battlefield Network communications
naval entities
network connectivity
network handover delay
network stability
noninteractive data
nonnegligible overhead
Protocols
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 1:25pm
national innovation
US military
Task Analysis
Servers
security vulnerabilities
security requirements
Security Policies Analysis
security of data
secure security architecture
public sector
pubcrawl
policy-based governance
Cloud Computing
national defense command control system
military computing
Korea national defense information system
Korea Military
Information systems
computer security
command and control systems
Cloud-based C4I Security Requirements
cloud-based C4I security architecture
cloud computing technology
cloud computing system
biblio
Enhancing Internet of Battle Things using Ultrasonic assisted Non-Destructive Testing (Technical solution)
Submitted by grigby1 on Tue, 11/17/2020 - 2:00pm
IoMT
ultrasonic waves
ultrasonic materials testing
ultrasonic based nondestructive testing
testing
smart things
Scalability
Resiliency
resilience
pubcrawl
Probes
network technology
military equipment
military computing
materials defect analysis
machine intelligence
Acoustics
IoBT NDT and Machine Intelligence
iobt
Internet of Things
Internet of Military of Things
Internet of Battle of Things
internet
Intelligent sensors
Inspection
information technology
Human Factors
embedded technology
embedded systems
defence industry
computer architecture
biblio
Misinformation Control in the Internet of Battlefield Things: A Multiclass Mean-Field Game
Submitted by grigby1 on Tue, 11/17/2020 - 2:00pm
pubcrawl
military computing
misinformation attack
misinformation control
misinformation propagation
multiclass agents
optimal probability
optimisation
probability
Mean-field game
QoI
quality of information
resilience
Resiliency
Scalability
Steady-state
telecommunication control
Human Factors
considered model
convergence
Curing
false information
finite IoBT case
forward backward sweep method
game theory
Games
Computational modeling
infection cost
Internet of Battlefield Things system
Internet of Things
iobt
IoBT node
massive heterogeneous IoBT system
mean-field equilibrium
biblio
A Multiclass Mean-Field Game for Thwarting Misinformation Spread in the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:59pm
military communication
Steady-state
security
Scalability
Resiliency
resilience
pubcrawl
multiclass mean-field game
multiclass agents
misinformation spread
misinformation propagation
misinformation attack
military computing
convergence
Mean-field game
mean-field equilibrium
IoBT operations
IoBT node
iobt
Internet of Things
Internet of Battlefield Things system
Human Factors
heterogeneous IoBT system
game theory
finite-IoBT case
epidemic models
biblio
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture
Submitted by grigby1 on Tue, 11/17/2020 - 1:59pm
military aircraft
warfare applications
sensors
security
Scalability
Resiliency
resilience
pubcrawl
Peer-to-peer computing
military operation
military computing
blockchain
iobt
Internet-of-battlefield things
Internet of Things
Human Factors
distributed ledger
Decision Making
cryptocurrencies
computer architecture
blockchain-enabled IoBT
Blockchain-empowered auditable platform
biblio
Multi-Domain Effects and the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
MDO effect loop decision process
Weapons
Task Analysis
sensors
Scalability
Radar
pubcrawl
multidomain operating environment
multidomain effects
Multi-Domain Operations (MDO)
military effects
military computing
Artificial Intelligence
IoBT effects
iobt
Internet of Things (IoT)
Internet of Things
Internet of battlefield things
Human Factors
effects
decision-making
Decision Making
decision frameworks
contemporary military decision-processes
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »