Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military computing
biblio
A Comparative Analysis of Visualisation Techniques to Achieve Cyber Situational Awareness in the Military
Submitted by grigby1 on Thu, 03/28/2019 - 2:13pm
cyber situational awareness
visualisation techniques
Royal Military Academy
operational picture
military commanders
Information systems
CyHSA
CyCOP
Cyber Hybrid Situational Awareness
cyber defense situational awareness
cyber defence implications
cyber common operational picture
Belgium
3D visualization
3D Operational Picture
situational awareness
security
Data visualization
data visualisation
Security Metrics
Comparative Analysis
Three-dimensional displays
Servers
military communication
military computing
composability
Resiliency
Metrics
pubcrawl
resilience
tools
security of data
biblio
The Information Processing in the Cybernetic Environment of Signals Intelligence
Submitted by aekwall on Mon, 03/25/2019 - 8:58am
information and communication technology
signal processing security
Signals Intelligence
Signal Intelligence
military operations
military computing
intelligence information
Information systems
information processing system
information processing
information processes
Resiliency
electronic warfare
Cyberspace
cybernetics
cybernetic environment
Decision Making
Metrics
component
composability
pubcrawl
biblio
A Command-by-Intent Architecture for Battlefield Information Acquisition Systems
Submitted by grigby1 on Mon, 12/10/2018 - 10:34am
pubcrawl
military operations
mission information
mission information needs
mission success rate
mission-critical decision making
NATO-based mission scenario
network resources
operational mission goals
Prefetching
military computing
real-time information collection
resilience
Resiliency
Scalability
sensor fusion
Sensor Systems
subordinate units
target tracking
target tracking application
Decision Making
Bandwidth
battlefield information acquisition systems
cache storage
Command-by-intent
command-by-intent architecture
commander intent
data fusion system
Data integration
decision authority
Anglova
Decision trees
Decision-centric
forwarding caching relevant data
Human Factors
information needs
Information systems
Internet of battlefield things
iobt
biblio
Context Aware Ubiquitous Biometrics in Edge of Military Things
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
operational context data collection
Internet of Things
iobt
IoMT
message authentication
military computing
military equipment
military personnel
military-battlefield applications
internet of military/battlefield things
pubcrawl
resilience
Resiliency
Scalability
soldier psychophysical condition continuous monitoring
static biometrics
ubiquitous computing
ubiquitous sensing
context-adaptive authentication
battlefield-level biometric monitoring
biometrics (access control)
Cloud Computing
computer architecture
computing devices
Conferences
context aware biometrics
context aware ubiquitous biometrics
authentication
Context-aware services
dedicated edge computing architecture
distributed processing
dynamic biometrics
edge of military things
Human Factors
Internet of battlefield things
Internet of military Things
biblio
“Combat Cloud-Fog” Network Architecture for Internet of Battlefield Things and Load Balancing Technology
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
military computing
Internet of battlefield things
Internet of Things
Internet of Things technology
iobt
load balancing strategy
load balancing technology
Load management
load-balancing
military communication
Internef ot Battlefield Things
pubcrawl
resilience
Resiliency
resource allocation
Scalability
Task Analysis
task response latency
the-Internet-of-Battlefield-Things
Distributed databases
battlefield information
Cloud Computing
combat cloud network
combat cloud- fog network architecture
combat cloud-fog network system
combat-cloud-fog
computer architecture
computing capability
distributed computing load balancing problem
battlefield environment
distributed generalized diffusion strategy
distributed processing
edge computing
edge network equipment close
fog computing layer
fog equipment
fog-computing
Human Factors
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
biblio
Modeling human-technology interaction as a sociotechnical system of systems
Submitted by grigby1 on Wed, 09/05/2018 - 9:42am
Fatigue
systems engineering
System-of-Systems
Sociotechnical System-of-Systems
sociotechnical system of systems
sociotechnical SoS
Sociotechnical
proof-of-concept
layered security
layered physical security system
Human-Technology Interaction
human technology interaction
Human Performance Factors
forward operating base
FOB
security
Detection Theory
Computing Theory
human computer interaction
modeling and simulation
Organizations
military computing
Metrics
Training
Computational modeling
Analytical models
security of data
Measurement
pubcrawl
Security Metrics
biblio
Decision-making in policy governed human-autonomous systems teams
Submitted by grigby1 on Thu, 08/23/2018 - 10:47am
machine reasoning processes
trust
social-exchange theory
social sciences computing
social exchange theory
pubcrawl
Protocols
policy governed human-autonomous system teams
multi-agent systems
military computing
Mathematical model
automated systems
learning (artificial intelligence)
Human Factors
Human behavior
decision-making
Decision Making
computer theory
collaboration
coalition environments
Biological system modeling
autonomous systems
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »