Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
road traffic
biblio
Dependable Adaptive Mobility in Vehicular Networks for Resilient Mobile Cyber Physical Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
Resiliency
lane departure warning
legal speed limit
Mathematical model
Metrics
network accountability
optimal information exchange
predicted exchanged information
Prediction algorithms
pubcrawl
resilience
Kalman filters
resilient mobile cyber physical systems
Resilient Vehicular Networking
road safety
road traffic
Safety
secure movement-prediction
traffic engineering computing
vehicles
vehicular ad hoc networks
vehicular networks
dependable adaptive mobility
adaptive manner
Adaptive Mobility
advanced driver-assistance systems
autonomous vehicles
collision avoidance
communication technologies
composability
connected moving vehicles
connected vehicles
corresponding developments
adaptive cruise control
Dependable Mobility
driver information systems
efficient functionality
environmental concerns
future locations
Global Positioning System
high mobility
improved safety
Intelligent Transportation Systems
Kalman filter
biblio
Abnormal Traffic Congestion Recognition Based on Video Analysis
Submitted by grigby1 on Mon, 01/11/2021 - 1:59pm
traffic engineering computing
road traffic flow data
road vehicles
Roads
Scalability
Sudden congestion
target tracking
time 60.0 s
Traffic congestion
traffic congestion events
traffic congestion incidents
Traffic detection
road traffic
traffic police
Trajectory
urban traffic management
Vehicle detection
vehicle flow
video analysis
video monitoring
video signal processing
video surveillance
video surveillance equipment
Metrics
abnormal traffic congestion recognition
China
computer vision
daily traffic management
deep learning
deep video
feature extraction
image motion analysis
Kalman filters
learning (artificial intelligence)
abnormal road traffic events
motion state
Multi object tracking and detection
multitarget tracking
neural nets
object detection
object tracking
pubcrawl
public security
resilience
Resiliency
biblio
Partially Predictable Vehicular Ad-hoc Network: Trustworthiness and Security
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
cloud
Trustworthiness Evaluation
secure trustworthiness evaluation based routing protocol
road traffic safety
road traffic efficiency
partially predictable vehicular ad-hoc network
Partially Predictable Network (PPN)
NS2 software
normalized routing overhead
Key-encrypted onion
intelligent communications
hybrid protocol
average end to end delay
road traffic
road safety
Relays
VANET
trustworthiness
packet delivery ratio
vehicular ad hoc networks
Routing
Routing protocols
composability
pubcrawl
Cryptographic Protocols
security
telecommunication security
Big Data
biblio
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge Computing
Submitted by grigby1 on Wed, 12/02/2020 - 2:03pm
response latency
Logic gates
mobility management (mobile radio)
next generation automotive edge computing
next generation networks
next-generation intelligent transportation system
Prototypes
pubcrawl
resilience
Resiliency
local edge server
road traffic
Scalability
Servers
synchronisation
telecommunication control
telecommunication traffic
traffic accidents
traffic engineering computing
vehicle dynamics
data traffic
5G mobile communication
5G networks
central cloud-based approach
central server
Cloud Computing
computer architecture
control and user plane separation
coupled congestion control
CUPS
5G
Dynamic mapping
dynamic mapping traffic
edge computing
edge computing architecture
edge servers
global dynamic mapping information
Intelligent Transportation Systems
Internet of Things
IoT
biblio
Comparison of Location Privacy Protection Schemes in VANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:39pm
VANET
manet privacy
special mobile ad hoc network
road traffic.
malicious node attacks
location privacy protection schemes
trajectory privacy
Probability distribution
road traffic
Trajectory
vehicular ad-hoc networks
privacy protection
Compositionality
data privacy
Correlation
Metrics
Wireless communication
vehicular ad hoc networks
VANETs
Roads
privacy
location privacy
pubcrawl
Resiliency
Protocols
telecommunication security
biblio
A Vehicle Trajectory Adversary Model Based on VLPR Data
Submitted by aekwall on Mon, 08/03/2020 - 10:38am
traffic engineering computing
qualified identifier attributes
Resiliency
road average speed
road traffic
road vehicles
Roads
Scalability
target trajectory
pubcrawl
Trajectory
trajectory linking
vehicle information
vehicle license plate recognition data
vehicle suspicion list
vehicle trajectory adversary model
VLPR system
image recognition
Adversary Modeling
Adversary Models
closest time method
Data models
data privacy
desensitized VLPR data
Foshan City VLPR data
Human behavior
adversary model
ITS
Licenses
Metrics
privacy
privacy attacking method
privacy disclosure
privacy protection
biblio
Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
traffic engineering computing
road accidents
road safety
road traffic
Roads
safe transportation
Scalability
security of data
substantial relevance
substantial traffic congestions
telecommunication traffic
Resiliency
traffic information
traffic simulation model
transmitted messages
trust
trusted autonomous vehicle
trustworthiness
VANET
vehicle dynamics
vehicle trust measurement
vehicular ad hoc networks
measuring trust
autonomous vehicle
AV
different OBU components
Driverless Car
extremely dynamic topographical conditions
false information
false trust
Global Positioning System
GPS data
Intelligent Transportation System
Autonomous automobiles
misleading information
On Board Unit
on-board unit components
on-board unit data
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
realistic traffic data
Reliability
resilience
biblio
Energy Efficient Embedded Systems for LED Lighting Control in Traffic
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
energy efficient embedded systems
universal embedded system
Smart Systems
quality lighting
microprocessor based embedded systems
low energy consumption
lighting control in traffic
lighting control
lighting
LED technology
LED lighting technology
LED lighting control
LED lighting
energy efficient microprocessor
Resiliency
energy consumption efficiency
digital embedded system
road traffic
light emitting diodes
energy consumption
embedded systems
microcontrollers
Energy Efficiency
Metrics
Roads
composability
pubcrawl
biblio
Security Analysis of Intelligent Transportation Systems Based on Simulation Data
Submitted by grigby1 on Fri, 05/08/2020 - 4:40pm
threat model
resilience
road safety
road traffic
roadside infrastructure units
security
Security analysis
security model
security of data
pubcrawl
traffic control
traffic engineering computing
Transportation
transportation efficiency
transportation security
vehicle ad hoc networks
Veins
Information systems
Intelligent Data Security
Compositionality
Resiliency
Scalability
Analytical models
Buildings
composability
information security
Intelligent Data and Security
Intelligent Transportation Systems
ITS
ITS system
layered network security model
malicious node threat
Metrics
Networked Control Systems Security
biblio
Towards Privacy in Geographic Message Dissemination for Connected Vehicles
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
legal regulations
Security by Default
vehicle routing
traffic information systems
traffic information
space-filling curves
server infrastructure
Routing
road traffic
privacy-by-design principle
privacy-by-design
privacy-by-default principle
location updates
location based services
road safety
geographic relevance area
geographic message dissemination
consistent hashing
connected vehicles
Traffic Management
user privacy
client-server systems
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
1
2
3
next ›
last »