Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
Cross-Layer Codesign for Secure Cyber-Physical Systems
Submitted by el_wehby on Fri, 05/25/2018 - 4:22pm
cyber-physical system security
sensors
security of data
security attacks
security
schedulability
resource-constrained cyber-physical systems
functional layer technique
cybersecurity techniques
cyber-physical systems
automotive domain
Cryptography
cross-layer codesign framework
cross-layer
control-theoretic methods
control systems
control performance
Computational modeling
Codesign
Automotive engineering
1553757
biblio
Dmodel: Online Taxicab Demand Model from Big Sensor Data in a Roving Sensor Network
Submitted by el_wehby on Fri, 05/25/2018 - 3:50pm
pickup pattern
wireless sensor networks
Training
traffic information systems
taxicab business
sensors
roving taxicabs
roving sensor network
Roads
real-world logical information
real-time systems
real-time mobile sensors
Accuracy
passenger demand inference
passenger arriving moments inference
online taxicab demand model
mobile computing
Meteorology
inference mechanisms
Dmodel
customized online training
Context
big sensor data
Big Data
1536086
biblio
DoS Attacks in Electrical Cyber-Physical Systems: A Case Study Using TrueTime Simulation Tool
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
predictive control
Metrics
model predictive control algorithm
networked control systems
power grid system
power grid vulnerability analysis
power grids
power system control
power system security
Mathematical model
pubcrawl
resilience
Resiliency
sensors
TrueTime Network Library
TrueTime simulation tool
TureTime Network Library
Vulnerability Analysis
Decentralized Control
Communication networks
composability
Compositionality
computer network security
control instructions actuators
Control Strategy
cyber security
cyber-physical systems
actuators
decentralized control strategies
distributed control
distributed control strategies
DoS attack
DoS attacks
ECPSs
electrical cyber-physical systems
Generators
biblio
A Framework for Cognitive Recommender Systems in the Internet of Things (IoT)
Submitted by grigby1 on Thu, 05/24/2018 - 12:10pm
Internet of Things(IoT)
Servers
sensors
Scalability
Resiliency
resilience
recommender systems
pubcrawl
peer-to-peer networks
Peer-to-peer computing
IoT
cognitive radio
Internet of Things
information technology
Human Factors
Human behavior
Engines
cognitive systems
cognitive system
cognitive recommender systems
cognitive radio networks
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
Internet of things (IoT) design considerations for developers and manufacturers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:59am
large-scale interconnectivity
smart devices
sensors
Security by Default
Security Assurance
Scalability
Resiliency
recommended design considerations
pubcrawl
Protocols
Monitoring
authentication
IoT ecosystem
IoT Design
IoT application
IoT
Internet of Things
information security
embedded systems
embedded security
computer network security
Business
biblio
Multi-layer model of swarm intelligence for resilient autonomous systems
Submitted by K_Hooper on Wed, 05/02/2018 - 10:38am
neural network
intelligence-surveillance-reconnaissance task
intelligent adaptive adversaries
Intelligent systems
learning (artificial intelligence)
lower layers
machine learning techniques
mobile robots
multilayer model
hostile environments
physical configuration
Planning
pubcrawl
reactive layer
resilient autonomous systems
sensors
stable environment
Swarm Intelligence
cyber-physical layer
anti-access area denial environments
artificial life concepts
artificial life paradigm
autonomous aerial vehicles
autonomous systems
bioinformatics
central nervous system
composability
Air Force Research Lab
deliberative layer
Embry-Riddle Aeronautical University
fast-reactive control systems
Force
genetic algorithm
genetic algorithms
genomics
higher layers
biblio
New Attack Vectors for Building Automation and IoT
Submitted by grigby1 on Wed, 04/11/2018 - 2:49pm
IoT
threat vectors
threat model
sensors
security of data
pubcrawl
privacy
new attack vectors
Metrics
Building automation
Internet of Things
Internet of Thing
encryption
data storage
cloud service
Cloud Computing
building management systems
building automation systems
biblio
Wearable Device User Authentication Using Physiological and Behavioral Metrics
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
sensors
physiological data
Physiological Fingerprint
physiological metrics
privacy
pubcrawl
Reliable Data Collection
resilience
Resiliency
Scalability
patient monitoring
smart wearables
standards
wearable computers
wearable device user authentication
Wearable Security
Wearable-User Authentication
wearable-user authentication mechanism
wearables security
wellness-related metrics
health care
Apple Watch
authentication
authorisation
behavioral metrics
Biomedical monitoring
biometrics (access control)
coarse-grain minute-level physical activity
feature extraction
Fitbit users
Activity-based Fingerprint
Healthcare
healthcare providers
Heart rate
Human behavior
message authentication
Microsoft Band
microsoft windows
mobile computing
one-time authentication approaches
biblio
Secure Lightweight Context-Driven Data Logging for Bodyworn Sensing Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
Scalability
medical domain
Medical services
Monitoring
privacy
pubcrawl
recording
resilience
Resiliency
Medical diagnostic imaging
secure lightweight context-driven data logging
sensor medical data storage
sensor placement
sensors
timestamping
wearable technology
wearables security
Biomedical monitoring
medical computing
Logic gates
localization
Human behavior
Forensics
Digital Forensics
data structures
data handling
data fingerprint storage
contextual information security
chronological epoch-level blocks
bodyworn sensing devices
body sensor networks
Bloom filters
blockchain
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »