Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bridges
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment
Submitted by grigby1 on Tue, 11/17/2020 - 2:58pm
middleware
tactical networks
sensors
Scalability
Resiliency
resilience
pubcrawl
process control
open systems
Object recognition
network management
multiforce environment
multiforce cooperation
multi-robot systems
military systems
battlefield scenarios
machine learning
IoT
iobt
interoperable control
interoperability
Internet of Things
Internet of battlefield things
innovative solutions
innovative paradigm
Human Factors
heterogeneous IoBT devices
Bridges
Big Data
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
automated damage assessment
Damage Assessment
sUAS
small unmanned aircraft systems
post-disaster response
optical radar
online mapping technique
natural disasters
lidar
Laser radar
Infrastructure Inspection
Homeland Security
Inspection
—sUAS
disasters
Aircraft
Bridges
National security
autonomous aerial vehicles
Three-dimensional displays
Cameras
pubcrawl
Resiliency
critical infrastructure
biblio
Nearest Neighbor Subsequence Search in Time Series Data
Submitted by grigby1 on Fri, 05/22/2020 - 2:28pm
horizontal pruning
TINN nodes
TINN model
TINN graph
time series nearest neighbor subsequence search
time series datasets
Time Series Data
temporal sequence data
Temperature sensors
subsequence similarity match problem
Subsequence Mining
similarity vectors
similarity search support
sensor data
range interval diversity properties
query processing strategy
Data mining
Bridges
augmented relationship graph model
Agriculture
nearest neighbor search
query processing
Time series analysis
graph theory
Meteorology
search problems
nearest neighbour methods
Measurement
Metrics
Indexes
pubcrawl
time series
biblio
Towards a Cyber-Physical System for Hydrobatic AUVs
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
open-source UAVCAN-ROS bridge
Flight Dynamics
gazebo
hardware-in-the-loop validation
hardware-software codesign
hydrobatic AUVs
hydrobatic SAM AUV
Mission Planning
multifidelity simulations
cyber-physical system
robust hardware-software interface
Simulink
substance cloud tracking
subsystem integration
system integration
Virtual Validation
Underwater Networks
control engineering computing
Hardware
Software
cyber-physical systems
Resiliency
pubcrawl
simulation
Metrics
mobile robots
Scalability
Robot sensing systems
algae farming
autonomous underwater vehicles
AUV network
Bridges
CAN bus
control
biblio
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
side channel attacks
network channel attacks
network traffic
openstack
physical machine
privacy
pubcrawl
Resiliency
security
security requirements
Network Channel Attack
Switches
TAP impersonation
Virtual machine monitors
virtual machines
virtualisation
virtualization privacy
virtualization services
VM-to-VM interference
internal cloud virtual network
Cloud Computing
cloud platform
co-located VMs
co-resident VMs
composability
computer network security
cross-Virtual machine network channel attack
data privacy
Human behavior
Bridges
internal virtual network
IP networks
logical resource isolation
malicious VM
Metrics
mirroring
Monitoring
multitenant virtualized cloud environments
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
PKI Mesh Trust Model Based on Trusted Computing
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
Metrics
Trusted Platform Module
Trusted Computing
trust model
Scalability
Robustness
Resiliency
public-key infrastructure
public key infrastructure
public key cryptography
Public key
pubcrawl
PKI Trust Models
PKI mesh trust model
authentication
Mesh networks
Human Factors
Human behavior
Electric breakdown
computer security
computer science
computational complexity
certification path processing
certification authorities
certification
certificate path processing
Bridges
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges
« first
‹ previous
1
2
3
next ›
last »