Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military aircraft
biblio
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture
Submitted by grigby1 on Tue, 11/17/2020 - 2:59pm
military aircraft
warfare applications
sensors
security
Scalability
Resiliency
resilience
pubcrawl
Peer-to-peer computing
military operation
military computing
blockchain
iobt
Internet-of-battlefield things
Internet of Things
Human Factors
distributed ledger
Decision Making
cryptocurrencies
computer architecture
blockchain-enabled IoBT
Blockchain-empowered auditable platform
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by aekwall on Mon, 12/02/2019 - 12:05pm
security
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
human-unmanned aerial vehicle
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
geolocation strategies
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
autonomous aerial vehicles
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
biblio
Attackers can spoof navigation signals without our knowledge. Here's how to fight back GPS lies
Submitted by el_wehby on Thu, 05/17/2018 - 8:11pm
Boats
CIA
Global Positioning System
GPS system hijack
Iran
marine navigation
Marine vehicles
military aircraft
military GPS signal
navigation signal spoofing
Receivers
Satellite broadcasting
1454474
biblio
Security, privacy and safety evaluation of dynamic and static fleets of drones
Submitted by grigby1 on Fri, 02/02/2018 - 1:20pm
multi-robot systems
Unmanned Aerial Vehicles
uav
Swarm Intelligence
static drone fleets
Security Evaluation
security
safety evaluation
Safety
Robot sensing systems
Resiliency
remotely operated vehicles
pubcrawl
privacy evaluation
privacy
particle swarm optimization
air-traffic control management
mobile robots
military aircraft
Metrics
localised fleet control
Internet of Vehicles
independent fleet control
Human Factors
Human behavior
flight control management
effective fleet control
dynamic drone fleets
drones
cyber physical systems
collision avoidance
autonomous aerial vehicles
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
biblio
Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
data sharing
set theory
secure data exchange
public network
pubcrawl170107
private key cryptography
private key attribute set
military aircraft
file sharing
encryption
electronic data interchange
data sharing systems
Access Control
Data Security
data encryption
data authentication
CP-ABE
confidentiality feature
ciphertext-policy attribute-based encryption
authentication feature
authentication
asymmetric encryption mechanism
Ad hoc networks