Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military computing
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 2:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
biblio
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
Internet-of-Battlefield Things security
Topology
Scalability
Sawtooth
pubcrawl
Protocols
permissioned blockchain
network topology
network configuration
mission oriented tasks
military technology
military computing
IoBT environment
iobt
Internet-of-Things solutions
Ad hoc networks
Internet of Things
Human Factors
ergonomics
distributed ledger
Distributed databases
data communication
Cybersecurity
Cryptography
centralized communication technology
blockchain-integrated IoBT platform
blockchain usability
blockchain
Bandwidth
biblio
2019 IEEE International Conference on Industrial Internet (ICII)
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
iobt
visualization
sharding approach
Sharding
Scalability
pubcrawl
NS-3 Simulation
networked battlefield scenario
mission-critical IoBT environment
Mission critical systems
military computing
military communication
military applications
lightweight blockchain
IoBT devices
blockchain
Internet-of-Battlefield-Things
Internet of Things
Internet of battlefield things
internet
Human Factors
Heuristic algorithms
FastChain simulator
drones
Decentralized Consensus
Cryptography
Computational modeling
communication resources
blockchain enabled IoBT scenarios
biblio
Application of Trust Assessment Techniques to IoBT Systems
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
machine learning systems
Trusted Computing
trust assessment techniques
trust
smart cities
sensors
security of data
Scalability
resilience
pubcrawl
Provenance
next-generation artificial intelligence
Monitoring
military sensing assets
military operations
military computing
computer security
learning (artificial intelligence)
IoT technology
IoT assets
IoBT systems
IoBT operational environments
iobt
Internet of Things
Internet of Battlefield Things paradigm
Internet of battlefield things
internet
Human Factors
diverse asset ownership
cybersecurity techniques
Cybersecurity
biblio
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
experimental controls
traditional CTF events
Task Analysis
red team
pubcrawl
psychology
military computing
human performance
Human Factors
Human Behavior and Cybersecurity
Human behavior
human attacker
future cyber operations studies
capture the flag
deeply rooted human component
Data collection
cyber testing
cyber deception experiment
controlled human-subject experiment
computer-security-computer-networks-computer-hacking-cyber-defense-research-and-development-humans-testing-deception
computer security
Computer crime
Computer bugs
cognitive testing
cognition
biblio
Mobile Transaction Processing for a Distributed War Environment
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
resilience
medical units
message transaction technique
Metrics
Microprocessors
military computing
mobile computing
mobile transaction processing
natural environment
optimistic concurrency control protocol
Processing time
Protocols
pubcrawl
Medical services
Resiliency
Sagas
security
serializability
Servers
Shadow paging
timely decisions
top-level commanders
transaction
transaction processing
transaction techniques
wounded soldiers
Databases
ambulance staff
battlefield environment
battlefield need
caching
Compensation Workflow
composability
computer architecture
Concurrency
concurrency control
CPS
cyber physical systems
database management systems
Actionability rules
Decision Making
distributed war environment
field hospital staff
health care
hospitals
incoming injured soldiers
irregular communications
medical authorities
medical information
medical information systems
medical service unit transactional workflow technique
biblio
Toward a framework for assessing the cyber-worthiness of complex mission critical systems
Submitted by aekwall on Mon, 10/05/2020 - 11:46am
initial framework
threat models
threat modelling
threat actor
system safety engineering
SysML
strong level
security of data
security
risk management
Resiliency
resilience
pubcrawl
military systems
military computing
Large-scale systems
Accreditation
highly contested cyber environment
high level threat actors
embedded systems
cyber-worthiness
cyber-physical systems
cyber physical systems
cyber
CPS resilience
computer security
complex systems
complex mission critical systems
complex military systems
certification
assurance
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
evolutionary design approach
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
TCPIP
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
Bandwidth
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
programming
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
biblio
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
cyberspace operations
threat models
Adversary Attribution
adversary tactics
ATT&CK framework
ATT&CK®
communication and information system security
CTI field
cyber related crimes
decision making process
deception techniques
Decoys
military organization
Mission Planning
NATO Allied Command Transformation
NATO Communication and Information Agency
Adversary Models
tools
Servers
Organizations
security
Resiliency
Human behavior
pubcrawl
Metrics
Computer crime
Scalability
testing
indicators of compromise
Workstations
Cyberspace
military computing
cyber threat intelligence
advanced persistent threats
biblio
Comparative study on KP-ABE and CP-ABE algorithm for secure data retrieval in military network
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
Key Managements
war zone
secure data retrieval
Scalability
remote devices
reliable data transmission
Reliability
pubcrawl
policy-based governance
military network
military computing
military communication
KP-ABE
key revocation
key policy attribute based encryption
attribute based encryption
Key Escrow
encryption
Disruption-Tolerant systems
disruption-tolerant networks
Decentralized Networks
Cryptography
CP-ABE algorithm
computer science
computer network reliability
collaboration
cipher text approach
authorisation
Attribute Revocation and Attribute Based Encryption
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »