Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Aerospace electronics
biblio
Re-encrypted Data Access Control Scheme Based on Blockchain
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
Cloud Computing
Access Control
encryption
Proxy re-encryption
Resiliency
pubcrawl
privacy
blockchain
Aerospace electronics
expandability
Compositionality
privacy protection
Thermal stability
RBAC
biblio
“I Don't Believe You”: Investigating the Effects of Robot Trust Violation and Repair
Submitted by grigby1 on Tue, 12/01/2020 - 1:23pm
resilience
trust violation framing
trust repair strategy choice
Trust Repair
trust
Solar system
robust trust
robots
robot trust violation
Robot Trust
robot repair
Resiliency
Aerospace electronics
pubcrawl
maintenance engineering
human-to-robot promises
human-robot interaction
Human Factors
Human behavior
Games
game theory
finance
competitive game
biblio
Compositional Abstraction for Networks of Control Systems: A Dissipativity Approach
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
linear control systems
Trajectory
Temporal Logic
system nonlinearities
Symmetric matrices
storage functions
simulation functions
pubcrawl
process control
nonlinear control systems
networks of control systems
matrix algebra
Matrices
linear temporal logic specification
Linear systems
Aerospace electronics
Large-scale systems
interconnection matrix
dissipativity-type properties
dissipativity-type compositional reasoning
dissipativity approach
dissipativity
controller design process
control system synthesis
control system networks
control nonlinearities
Compositionality
compositional scheme
compositional abstraction
Approximate abstractions
biblio
Compositional Construction of Approximate Abstractions of Interconnected Control Systems
Submitted by grigby1 on Mon, 10/05/2020 - 1:59pm
interconnected control systems
Trajectory
Temporal Logic
stability
simulation functions
simulation function
pubcrawl
nonlinear control systems
Lyapunov-like function
Lyapunov methods
linear temporal logic specification
Linear systems
linear control systems
Interconnected Systems
Aerospace electronics
interconnected control system
feedback
externally stabilizable subspaces
controller design process
control system synthesis
continuous time systems
continuous control system
concrete control system
Concrete
Compositionality
compositional construction approximate abstraction
cognition
Approximate abstractions
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
MIMO communication
Cross Layer Security
wireless networks on-board aircraft
WAICs technology
system design complexity
standard technologies
secure wireless avionics intra-communications
radioaltimeters
physical cross-layer security design
multiple-input multiple-output systems
Medium Access Control
MAC-PRY cross-layer design
internal aeronautics bus technologies
composability
aircraft communication
telecommunication security
wireless technology
Aircraft
access protocols
radiofrequency interference
avionics
Aerospace electronics
Wireless communication
Communication system security
wireless sensor networks
pubcrawl
Resiliency
computer architecture
security
biblio
Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
mobile ad hoc network
Vectors
telecommunication network routing
Scalability
routing attacks
Routing
risk aware response technique
risk aware response mechanism
risk aware
Resiliency
resilience
pubcrawl
Mobile handsets
mobile devices
mobile ad hoc networks
Aerospace electronics
minimisation
MANET
Intrusion Response
Human behavior
Heuristic algorithms
DSDV algorithm
Dijkstra shortest path algorithm
destination sequenced distance vector algorithm
Destination sequenced Distance Vector
Conferences
computer science
centralized base point
black hole attack minimization
Attack vectors
biblio
Enabling Secure Voice Input on Augmented Reality Headsets using Internal Body Voice
Submitted by grigby1 on Thu, 06/04/2020 - 11:47am
speech-based user interfaces
primary input method
privacy
pubcrawl
resilience
Resiliency
security of data
smart phones
Speech recognition
multi-agent systems
Stability analysis
Synchronization
voice spoofing attack
voice verification techniques
voice-based input
voice-spoofing attacks
voice-spoofing defense system
voice-spoofing defense systems
human voices
AR headsets
augmented reality
augmented reality headsets
composability
cyber physical systems
Eigenvalues and eigenfunctions
handy recorders
Human Factors
Aerospace electronics
immersive systems
inaudible voice commands
internal body propagation
internal body voice
Laplace equations
Linear systems
liveness detection
biblio
Test methodology for detecting short-channel faults in network on- chip networks using IOT
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
integrated circuit reliability
short-channel fault detection
Routing
routers networks
Power demand
NoC
network-on-chip analysis machine
network-on-chip
network routing
network on- chip networks
network on chip
Monitoring
IoT
Internet of Things
interconnection networks
integrated circuit testing
network on chip security
Integrated circuit interconnections
fault diagnosis
Encoders/decoders
Data Security
Data protection
data encryption
Cryptography
Conferences
computing-intensive data processing
computer architecture
Aerospace electronics
Metrics
Resiliency
resilience
Scalability
biblio
Secure Memory for Embedded Tamper-Proof Systems
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
security of data
memory supply voltage manipulation
metastability
Metrics
protection circuitry
pubcrawl
Resiliency
Scalability
secure memory
Memory management
storage management
Tamper resistance
tamper-proof embedded systems
tamper-proof system
Tamper-Resistance
Trusted Component
Voltage measurement
Aerospace electronics
memory instability
memory data leakage protection
memory data change
memory cell circuitry
integrated circuits
Integrated circuit modeling
Human Factors
Human behavior
embedded tamper-proof systems
embedded systems
Data protection
data change scenaria
Cryptography
composability
change memory contents
« first
‹ previous
1
2
3
4
5
next ›
last »