Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
environmental monitoring
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
energy conservation
wireless sensor networks
voronoi diagram paradigm
Voronoi diagram
sensed data
secure data exchange
Resiliency
pubcrawl
providing security
Protocols
military surveillance
environmental monitoring
energy efficient encryption
energy consumption
Aggregation
encryption
efficient encryption
Decryption Technique
decryption
DEAVD protocol compresses data
data encryption
data communication
data aggregation
cyber physical systems
Cryptography
Cryptographic Protocols
computational geometry
composability
biblio
Secured Architecture for Unmanned Surface Vehicle Fleets Management and Control
Submitted by grigby1 on Tue, 12/15/2020 - 1:43pm
robot operating systems
water cleaning
USV
unmanned vehicles
unmanned surface vehicles
unmanned surface vehicle fleets management
unmanned surface vehicle fleets control
Task Analysis
Software Architecture
security of data
security
secured architecture
search and rescue operations
Sea surface
SCADA systems
SCADA
computer architecture
risky weather conditions
Resiliency
resilience
remotely operated vehicles
pubcrawl
policy-based governance
Monitoring
mobile robots
Marine vehicles
Human Factors
Human behavior
environmental monitoring
cyber-physical systems
Control System
control engineering computing
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
file
Adaptive Water Quality Sampling with Autonomous Vehicles with Applications to Nitrate Deposition
Submitted by Marin Kobilarov on Wed, 04/08/2020 - 3:22pm. Contributors:
Marin Kobilarov
Gaurav Sukhatme
William Ball
autonomous underwater vehicles
water quality
environmental monitoring
Adaptive Sampling
Planning
control
Lightning Talks
1646500
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
ROS-based Robot Development Toward Fully Automated Network Management
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
pubcrawl
Temperature sensors
softwarelization technologies
Software
Servers
SDN
ROS-based robot development
ROS
robots
Robot sensing systems
Robot Operating System
Robot
Resiliency
automation
operating systems (computers)
NFV transfers
network management
Monitoring
fully automated network management robot
expandability
environmental monitoring
cyber-physical world
control engineering computing
composability
commercial network center
biblio
Security Challenges and Risk Evaluation Framework for Industrial Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
Peer-to-peer computing
wireless sensor networks
Wireless communication
smart factories
security weaknesses
security challenges
security
risk management
risk evaluation framework
risk evaluation
Resiliency
resilience
pubcrawl
Production facilities
production equipment
policy-based governance
collaboration
Monitoring
Metrics
IWSN
intelligent manufacturing
information system
Industry 4.0
Industries
industrial wireless sensor networks
Industrial Control Systems
Human Factors
Human behavior
environmental monitoring
condition parameter monitoring
condition monitoring
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations