Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software Architecture
biblio
BBS: Micro-Architecture Benchmarking Blockchain Systems through Machine Learning and Fuzzy Set
Submitted by aekwall on Mon, 01/18/2021 - 11:27am
fuzzy set theory
Fuzzy Cryptography
Workload Characterization
microarchitecture benchmarking blockchain systems
micro architecture
irreversibility
Caliper
Blockbench
Benchmarking
BBS
decentralization
Fabrics
Traceability
Benchmark testing
Software Architecture
Scalability
Measurement
Distributed databases
Performance
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Protocols
Cryptography
biblio
Systems Engineering Architecture Framework for Physical Protection Systems
Submitted by aekwall on Mon, 01/11/2021 - 1:39pm
architecture
Architecture Framework
computer architecture
Deterrence
Human behavior
modeling
Physical Protection Systems
pubcrawl
Resiliency
Scalability
Software Architecture
Stakeholders
Systems architecture
systems engineering
Systems engineering and theory
biblio
Neural Network and ROS based Threat Detection and Patrolling Assistance
Submitted by grigby1 on Thu, 12/17/2020 - 1:38pm
Robot vision systems
operating systems (computers)
patrolling assistance
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System
robot operating systems
robot vision
object detection
robotic automation
ROS based threat detection
security
Service robots
Software Architecture
software architecture design
Weapons
YOLO
ergonomics
autonomously moving bots
Cameras
computer architecture
computer vision
computer vision algorithms
control engineering computing
convolutional neural networks
daily ergonomics
autonomous navigation
hardware components
Human behavior
Human Factors
Lasers
mobile robots
navigation
neural nets
neural network
biblio
Secured Architecture for Unmanned Surface Vehicle Fleets Management and Control
Submitted by grigby1 on Tue, 12/15/2020 - 1:43pm
robot operating systems
water cleaning
USV
unmanned vehicles
unmanned surface vehicles
unmanned surface vehicle fleets management
unmanned surface vehicle fleets control
Task Analysis
Software Architecture
security of data
security
secured architecture
search and rescue operations
Sea surface
SCADA systems
SCADA
computer architecture
risky weather conditions
Resiliency
resilience
remotely operated vehicles
pubcrawl
policy-based governance
Monitoring
mobile robots
Marine vehicles
Human Factors
Human behavior
environmental monitoring
cyber-physical systems
Control System
control engineering computing
biblio
Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
metadata
valuable scientific data
Systems architecture
system architecture
Software Architecture
Software
scientific information systems
Scalability
Resiliency
resilience
pubcrawl
preservation metadata
PREMIS
object transformation
Metadata Discovery Problem
Chemicals
meta data
mapping rules
Grammar
format verification
format migration
e-science
digital signatures
digital signature
digital preservation
data intensive scientific discovery
data integrity
data fixity
data authenticity
Compositionality
biblio
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT
Submitted by grigby1 on Tue, 11/17/2020 - 2:50pm
QoS monitoring
NRL CORE network emulator
online learning
overlay
overlay tunnels
Path optimization
planner
protocol synthesis
pubcrawl
networking conditions
quality of service
Scalability
Software Architecture
telecommunication traffic
transport protocols
transport service needs
tunnel transport protocol optimization
tunnels
Internet of Things
dispersed computing
dispersed computing applications
dynamic overlay system
dynamic path optimization
dynamic transport overlay system
Human Factors
internet
Internet of battlefield things
application traffic
iobt
IP networks
mission-oriented dispersed computing
Nebula's overlay system
Network Backhaul Layered Architecture system
network computation points
network discovery
biblio
Safe and Secure Data Fusion — Use of MILS Multicore Architecture to Reduce Cyber Threats
Submitted by aekwall on Mon, 11/16/2020 - 2:58pm
multicore-based real-time operating system
data fusion-based systems
flexible software architectures
functional assurance capabilities
High Robustness
high-robustness separation kernel certification
INTEGRITY-178 tuMP
MILS multicore architecture
multicore
multicore processor
cyber-attack space
multiple independent levels
restricted hardware access
RTOS
Separation Kernel
single-core processors
system providers
system security architecture
Resilient Security Architectures
operating systems (computers)
Resiliency
pubcrawl
Software Architecture
sensor fusion
data flows
aerospace computing
safety-critical software
scheduling
telecommunication security
security risks
multiprocessing systems
MILS
air traffic safety
architecture configurations
civil aircraft systems safety
covert channel prevention
cyber threats reduction
biblio
Modeling and Analysis Cyber Threats in Power Systems Using Architecture Analysis Design Language (AADL)
Submitted by aekwall on Mon, 11/16/2020 - 2:58pm
Power Grid
Resilient Security Architectures
switching attack
Power systems security
power system information models
Model-based analysis
FDI attack
false data injection attacks
cyber-physical modeling capabilities
cyber-physical model
cyber-grid components
Architecture Analysis & Design Language
AADL
specification languages
security of data
verification techniques
cyber threats
power systems
program verification
power grids
power system security
power engineering computing
Software Architecture
cyber-physical security
pubcrawl
Resiliency
cyber-physical systems
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
system life cycle
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
functional-level security requirements
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
Software Architecture
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Safety
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »