Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Veins
biblio
VR, Deepfakes and Epistemic Security
Submitted by grigby1 on Thu, 08/24/2023 - 1:50pm
cyber physical systems
Epistemic Security
AIVR Ethics
Threat Modeling
Human Factors
Cyber Physical System
Veins
VR
Deepfakes
ethics
Training
immersive systems
virtual reality
composability
privacy
Safety
Resiliency
resilience
Human behavior
pubcrawl
biblio
Formal Verification of Secure Forwarding Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 11:31am
Network-Security
Veins
Security-Protocols
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
parametrized-verification
network topology
authentication
Isabelle/HOL
Formal-Verification
data-plane
computer architecture
Compositionality
composability
collaboration
autonomous systems
authorization
biblio
Distributed AI-based Security for Massive Numbers of Network Slices in 5G amp; Beyond Mobile Systems
Submitted by grigby1 on Tue, 01/25/2022 - 3:49pm
security
pubcrawl
resilience
Resiliency
5G mobile communication
composability
Artificial Intelligence
Scalability
network slicing
Autonomic Security
6G mobile communication
Veins
biblio
Security Analysis of Intelligent Transportation Systems Based on Simulation Data
Submitted by grigby1 on Fri, 05/08/2020 - 3:40pm
threat model
resilience
road safety
road traffic
roadside infrastructure units
security
Security analysis
security model
security of data
pubcrawl
traffic control
traffic engineering computing
Transportation
transportation efficiency
transportation security
vehicle ad hoc networks
Veins
Information systems
Intelligent Data Security
Compositionality
Resiliency
Scalability
Analytical models
Buildings
composability
information security
Intelligent Data and Security
Intelligent Transportation Systems
ITS
ITS system
layered network security model
malicious node threat
Metrics
Networked Control Systems Security
biblio
Security Lock with Effective Verification Traits
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
speech pattern recognition
multilevel security system
multiple layer security system
physical security
Raspberry Pi microcomputers
recognition
security lock
security locker solution
smart box
multi-layer
Speech recognition
TensorFlow
vein pattern recognition
vein recognition
Veins
verification traits
Viola and Jones
pattern locks
pubcrawl
Scalability
authorisation
Linux
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
security
password
Cameras
Fingerprint recognition
face recognition
facial recognition
graphical user interfaces
interactive GUI
machine learning operations