Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
drones
biblio
A Study on UAV Operating System Security and Future Research Challenges
Submitted by grigby1 on Fri, 07/29/2022 - 4:13pm
pubcrawl
resilience
Resiliency
Conferences
computer security
Task Analysis
operating systems
Transportation
surveillance
drones
Operating systems security
operating system security
Drone security
embedded system security
unmanned aerial vehicle
biblio
Securing Drone-based Ad Hoc Network Using Blockchain
Submitted by aekwall on Mon, 12/20/2021 - 11:18am
Drone-based Ad Hoc Network
surveillance
security
Resiliency
pubcrawl
privacy
power plant
power generation
Metrics
drones
Acoustic Information
Compositionality
Blockchain Model
blockchain
Artificial Intelligence
Anomaly Detection
Ad hoc networks
Ad Hoc Network Security
Acoustics
biblio
Testing UAVs. Workshop on Assured CPS Autonomy for 3D Urban Transportation: Drones, Flying Cars and Beyond
Submitted by Alexander Pretschner on Fri, 08/13/2021 - 1:02pm
PIRE
Societal Design
autonomous vehicles
drones
autonomous aerial vehicles
urban transportation
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
surveillance videos
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
Proxy re-encryption
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
encryption
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
autonomous aerial vehicles
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
biblio
Cyber Security Assessment of the Robot Operating System 2 for Aerial Networks
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
robot programming
military-centric robotics platform
mobile robots
operating systems (computers)
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System 2
robot operating systems
military systems
robotic middleware
robots
ROS
ROS 1 security vulnerabilities
ROS 2
security
standards
UAV swarms
unmanned Naval aerial swarms
DDS standard
authentication
autonomous aerial vehicles
autonomous systems
control engineering computing
Cryptography
cyber security
cyber security assessment
Data Distribution Service standard
DDS security architecture
aerial networks
drones
encryption
GCS
ground control station
Human behavior
Human Factors
middleware
military computing
military grade unmanned systems
biblio
A Real-time Drone Surveillance System Using Pixel-level Short-time Fourier Transform
Submitted by grigby1 on Fri, 12/11/2020 - 1:42pm
resilience
video surveillance
Vibrations
vibration source localization
vibration frequency components
time-series features
time-frequency responses
Time-frequency Analysis
Time Frequency Analysis
surveillance
SLAM (robots)
security
Scalability
robot vision
Resiliency
autonomous aerial vehicles
real-time systems
real-time drone surveillance system
pubcrawl
Propellers
pixel-level short-time Fourier transform
multicopter localization
mobile robots
Metrics
Image resolution
high-frame-rate video
helicopters
Fourier transforms
drones
Cameras
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
2019 IEEE International Conference on Industrial Internet (ICII)
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
iobt
visualization
sharding approach
Sharding
Scalability
pubcrawl
NS-3 Simulation
networked battlefield scenario
mission-critical IoBT environment
Mission critical systems
military computing
military communication
military applications
lightweight blockchain
IoBT devices
blockchain
Internet-of-Battlefield-Things
Internet of Things
Internet of battlefield things
internet
Human Factors
Heuristic algorithms
FastChain simulator
drones
Decentralized Consensus
Cryptography
Computational modeling
communication resources
blockchain enabled IoBT scenarios
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
1
2
3
next ›
last »