Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military computing
biblio
Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
marketplaces
US Navy
Tor
surface Web
sophisticated social engineering attacks
security of data
pubcrawl
PII
OWL Cybersecurity
OPSEC
operational security
open internet
military operations
military computing
anonymity
leaked data
internet
Human Factors
Human behavior
deep web
deanonymization
data sale
data leaks
data breaches
dark Web marketplaces
dark web
breached information
armed forces
biblio
For a Baltic Cyberspace Alliance?
Submitted by grigby1 on Fri, 07/03/2020 - 5:06pm
information warfare defense
United States
United Kingdom
security of data
Scalability
Resiliency
resilience
pubcrawl
NATO
military computing
alliances
Human behavior
Five Eyes coalition
Deterrence
data privacy
cyberattack
cyber defense
collective cyberspace defense
Baltic cyberspace alliance
biblio
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
software defined networking
Mobile Edge Computing
Network reconnaissance
network resource allocation
pubcrawl
realistic tactical scenarios
resource allocation
resource management
SDN architecture
short message service
mobile computing
software-defined radio networking
Tactical cloudlets
tactical environments
tactical SMS
tactical traffic flow
telecommunication traffic
trusted tactical cloudlets
trusted third-part authority
unmanned vehicle patrol deployment
distributed SDN-based C4ISR communications
centralized SDN controller
Cloud Computing
computerized-command-control-communications-intelligence- surveillance reconnaissance infrastructure
decentralized cloudlets layer
decentralized MEC layer
Delay-Tolerant Network
delays
distributed cloudlets
distributed SDN
C4ISR
end-to-end delay
generation military environment
high bite rate ISR
Information systems
intelligence-surveillance-reconnaissance video
MEC
military communication
military computing
biblio
Merging DoDAF architectures to develop and analyze the DoD network of systems
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
merging
Systems engineering and theory
system-to-system matrix
system architectures
network metrics
military communication
Joint Interoperability and Capability Development System process
DoD network of systems
DoD legacy systems
DoD leadership
DoD Information Network
DoD Architecture Framework products
Department of Defense
network accountability
computer architecture
information networks
US Department of Defense
open systems
social network analysis
interoperability
military computing
Software Architecture
Measurement
Metrics
social networking (online)
composability
pubcrawl
Resiliency
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Towards establishment of cyberspace deterrence strategy
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
civilian defense strategists
Weapons
strategy
social aspects of automation
National security
military security
first-strike
cyberspace deterrence strategy
cyberdeterrence
cyberattacks
credible declaratory retaliation capability
counter-strike
confidentiality
security of data
Deterrence
military computing
Cyberspace
resilience
Information systems
Availability
integrity
Economics
pubcrawl
Human behavior
Scalability
Computer crime
biblio
DDoS Mitigation: Decentralized CDN Using Private Blockchain
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
Bandwidth
public administration
private blockchain
military organizations
military agencies
government agencies
distributed CDN Schema
Content Delivery Network(CDN)
content delivery network
CDN system
DDoS attack mitigation
resilience
contracts
military computing
Computer crime
Companies
internet
Metrics
composability
pubcrawl
Human behavior
Cryptography
Servers
IP networks
distributed denial of service attacks
ddos mitigation
computer network security
biblio
Computational Intelligence in Maritime Security and Defense: Challenges and Opportunities
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
military computing
Training
simulated annealing
Security & Defense applications
security
review CI applications
pubcrawl
Oceans
neural nets
NATO Nations
Artificial Intelligence
maritime domain
knowledge based systems
groupware
evolutionary computation
Cryptography
computational intelligence
Compositionality
composability
CI techniques
biblio
YOLO Approach in Digital Object Definition in Military Systems
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
object detection
YOLO approach
visual surveillance
Videos
video surveillance
video processing
two-dimensional videos
traffic monitoring
surveillance
Scalability
Resiliency
real-time generation detection
pubcrawl
Pattern recognition
outdoor monitoring applications
object tracking
Big Data
multimedia content-based indexing
military systems
military computing
military applications
Metrics
information acquisition
indoor monitoring applications
human tracking
distributed cross-camera surveillance systems
digital object definition
deep video
deep learning
cyber terrorism
Cameras
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »