Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
real-time systems
biblio
Formal Verification of Fault-Tolerant and Recovery Mechanisms for Safe Node Sequence Protocol
Submitted by BrandonB on Wed, 05/06/2015 - 2:39pm
machine
Tunneling magnetoresistance
SNSP
safe node sequence protocol
Redundancy
recovery mechanisms
real-time systems
Protocols
protocol state machine
model checking
event-triggered protocol
formal verification
fault-tolerant system
fault-tolerant prototype system
Fault-Tolerance
Fault tolerant systems
fault tolerance
fault model
fault classes
failure modes
biblio
Managing shared contexts in distributed multi-player game systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:17pm
Protocols
war games
SINS
Silicon compounds
shared context mapping
Semantics
security of data
secure infrastructure for networked systems
reliable middleware framework
Receivers
real-time systems
anonymous publish-subscribe
network losses-delay
multiplayer maze game
middleware
message passing
Lamport Paxos protocol
Irrigation
distributed transactional key-value store
distributed multiplayer game systems
delays
computer games
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 12:31pm
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
biblio
Operational data classes for establishing situational awareness in cyberspace
Submitted by BrandonB on Tue, 05/05/2015 - 12:30pm
networking technologies
US Department of Defense
United States
tactical decision-making
strategic decision-making
security of data
real-time systems
operational needs
operational decision-making
operational data classes
operational cyber environment
Cyber Attacks
military computing
Intrusion Detection
Information systems
Educational institutions
Department of Defense
defence industry
Decision Making
cyberspace operations
Cyberspace
cyber situational awareness
biblio
Securing intelligent substations: Real-time situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
Monitoring
Substations
substation intrusion detection-prevention system
substation automation
SIEM system
SIEM
security of data
security information and event management system
real-time systems
real-time situational awareness
Protocols
power engineering computing
computer security
IPS
intelligent substation
IEC61850
IDS
IDPS
electrical distribution companies
DNP3
cyber security
critical infrastructure system
critical infrastructure cyber security defense system
critical infrastructure
biblio
Morphing communications of Cyber-Physical Systems towards moving-target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:18am
morphing communications
traffic analysis attacks
Time factors
thwarting traffic analysis attacks
telecommunication traffic
Silicon
security
reliable communication services
real-time systems
networking infrastructures
network sessions
moving-target defense
Algorithm design and analysis
long-range communication services
internet
inter-packet delays
Information systems
eavesdrop network traffic
delays
cyber-physical systems
CPSMorph traffic morphing algorithm
CPS traffic
computer network reliability
biblio
Information Security Maintenance Issues for Big Security-Related Data
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
information security maintenance
security-related data
security of data
security
secure infrastructure
real-time systems
IT infrastructure
ISM
information security maintenance issues
arrays
information security
Distributed databases
Data visualization
Data models
big security-related data
big data protection problem statement
Big Data
biblio
Automated Intrusion Response System Algorithm with Danger Theory
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
Detectors
security
real-time systems
real-time network danger evaluation equation
network security
memory detector
Mathematical model
Knowledge Discovery
immature detector
distributed computing
adaptive automated intrusion response system
danger theory
danger evaluation
computer network security
Communication networks
automated intrusion response system
artificial immune systems
artificial immune system
artificial immune
biblio
Urban traffic commuting analysis based on mobile phone data
Submitted by BrandonB on Mon, 05/04/2015 - 2:38pm
OD information
urban traffic commuting analysis
trip generation mechanism
trip attraction
traffic information systems
traffic information extraction
Statistics
Sociology
real-time systems
pattern clustering
Base stations
mobile phone data acquisition
Mobile handsets
mobile computing
Mobile communication
k-means clustering algorithm
feature extraction
data acquisition
Cities and towns
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
next ›
last »