Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military applications
biblio
Quantum Computing for Military Applications
Submitted by aekwall on Fri, 04/01/2022 - 1:06pm
Logic gates
machine learning
military computing
pubcrawl
Resiliency
Compositionality
Predictive Metrics
quantum computing
Computers
annealing
military applications
Quantum mechanics
Qubit
use cases
Scientific Computing Security
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
2019 IEEE International Conference on Industrial Internet (ICII)
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
iobt
visualization
sharding approach
Sharding
Scalability
pubcrawl
NS-3 Simulation
networked battlefield scenario
mission-critical IoBT environment
Mission critical systems
military computing
military communication
military applications
lightweight blockchain
IoBT devices
blockchain
Internet-of-Battlefield-Things
Internet of Things
Internet of battlefield things
internet
Human Factors
Heuristic algorithms
FastChain simulator
drones
Decentralized Consensus
Cryptography
Computational modeling
communication resources
blockchain enabled IoBT scenarios
biblio
Secure Data Packet in MANET Based Chaos-Modified AES Algorithm
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
chaotic communication
manet privacy
Wireless Ad-Hoc Networks
secure data packet
safety-sensitive applications
privacy conference meetings
passive attack
open architecture
MANET based chaos-modified AES algorithm
data packets payload
data packet
chaotic
dynamic topology
key generation
AES
Three-dimensional displays
Cryptography
Compositionality
chaos
military applications
telecommunication network topology
mobile ad hoc networks
MANET
Logistics
Metrics
privacy preservation
pubcrawl
Resiliency
telecommunication security
data privacy
encryption
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 10:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
biblio
YOLO Approach in Digital Object Definition in Military Systems
Submitted by aekwall on Mon, 08/12/2019 - 8:46am
object detection
YOLO approach
visual surveillance
Videos
video surveillance
video processing
two-dimensional videos
traffic monitoring
surveillance
Scalability
Resiliency
real-time generation detection
pubcrawl
Pattern recognition
outdoor monitoring applications
object tracking
Big Data
multimedia content-based indexing
military systems
military computing
military applications
Metrics
information acquisition
indoor monitoring applications
human tracking
distributed cross-camera surveillance systems
digital object definition
deep video
deep learning
cyber terrorism
Cameras
biblio
Semantic Information Fusion to Enhance Situational Awareness in Surveillance Scenarios
Submitted by grigby1 on Tue, 02/06/2018 - 1:04pm
inference mechanisms
Network reconnaissance
National security
military computing
military applications
Markov processes
Markov logic network
logical reasoning
knowledge model
ISR-AA
intelligence-surveillance-and-reconnaissance analytics architecture
information integration
Object oriented modeling
high-level data fusion component
enhanced situational awareness
Databases
Data mining
Data integration
critical events detection
cognition
civil protection
autonomous aerial vehicles
aerospace computing
Resiliency
Unmanned Aircraft Systems
UAS
surveillance scenarios
surveillance
situational picture
situational awareness
sensor fusion
sensor data
semantic information fusion
security forces
video surveillance
reasoning component
pubcrawl
probabilistic reasoning
Probabilistic logic
probabilistic information processing
OOWM
Ontology
ontologies (artificial intelligence)
object-oriented world model
object-oriented methods
biblio
Security techniques for the WSN link layer within military IoT
Submitted by grigby1 on Mon, 11/13/2017 - 10:59am
Resiliency
WSN link layer
wireless sensor networks
trusted platform modules
Trusted Platform Module
telecommunication security
sensor nodes
security techniques
security
composability
pubcrawl
military communication
military applications
Internet of Things
fault tolerant sensor network
energy resources
Cryptography
cryptographic protection