Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield Things
Submitted by grigby1 on Fri, 02/24/2023 - 3:45pm
computer architecture
pubcrawl
Resiliency
Scalability
sensors
real-time systems
resilience
operating systems
automation
target tracking
Internet of battlefield things
iobt
Human Factors
military systems
edge intelligence
Sensing-to-Decision Loops
biblio
Information Assurance in modern ATE
Submitted by grigby1 on Fri, 02/17/2023 - 4:41pm
Information Assurance
ATE
computer
Costs
cyber security
operating systems
pubcrawl
resilience
Resiliency
Scalability
security
Software
software assurance
Software measurement
Time measurement
Trademarks
biblio
A Review of Android and iOS Operating System Security
Submitted by grigby1 on Fri, 02/17/2023 - 4:11pm
ios
privacy threat
mobile device security
memory randomization
isolation
application sandboxing
policy governance
sandboxing
Memory
Mobile communication
encryption
android
operating systems
Mobile Applications
composability
pubcrawl
security
Organizations
collaboration
biblio
Analyzing Interoperability and Security Overhead of ROS2 DDS Middleware
Submitted by grigby1 on Fri, 02/17/2023 - 4:07pm
operating systems
ros2
Publish-subscribe
DDS
policy governance
Turning
Robot Operating System
usability
interoperability
collaboration
middleware
Switches
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
security
biblio
Web Platform for General Robot Controlling system
Submitted by grigby1 on Fri, 02/17/2023 - 4:06pm
Prototypes
social robot
humanoid robot
policy governance
microcomputers
social robots
Robot Operating System
Robot sensing systems
operating systems
Cloud Computing
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Artificial Intelligence
security
collaboration
biblio
Multi-Robot Security System based on Robot Operating System and Hybridized Blockchain Model
Submitted by grigby1 on Fri, 02/17/2023 - 4:06pm
operating systems
trajectory planning
Multi robot system
Hybridized Blockchain Model
policy governance
decentralization
blockchains
Robot kinematics
ROS
Robot Operating System
collaboration
real-time systems
Protocols
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
security
biblio
Real-Time Control-Flow Integrity for Multicore Mixed-Criticality IoT Systems
Submitted by aekwall on Fri, 02/17/2023 - 9:41am
composability
software security
rop attacks
operating systems
control-flow integrity
ROP
return-oriented programming
JOP
Multicore processing
control systems
Internet of Things
security
Resiliency
Scalability
pubcrawl
Virtual machine monitors
real-time systems
IoT
Human Factors
timing
Software
biblio
Study on the classification model of lock mechanism in operating system
Submitted by grigby1 on Fri, 02/03/2023 - 4:09pm
Computational modeling
spinlock
semaphore
lock model
lock chain structure
pattern locks
System recovery
Software algorithms
operating systems
computer architecture
Scalability
Software
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
BenchAV: A Security Benchmarking Framework for Autonomous Driving
Submitted by grigby1 on Fri, 01/13/2023 - 3:20pm
Robot Operating System Security
Autonomous Driving
autonomous vehicle
Benchmark testing
Benchmarking
Measurement
Metrics
operating systems
Pressing
pubcrawl
Roads
Safety
security
Security Metrics
Software
biblio
An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services
Submitted by aekwall on Fri, 01/13/2023 - 3:04pm
security
Scalability
operating systems
pubcrawl
Open Source Software
Compositionality
Prototypes
Cloud Security
automation
Composite Services
elasticity
Resource Migration
security automation
Vulnerability Management
security scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »