Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transportation
biblio
Design and Analysis of a New RFID Security Protocol for Internet of Things
Submitted by grigby1 on Thu, 09/16/2021 - 2:11pm
Human behavior
information science
information technology
Internet of Things
New
Protocols
pubcrawl
radio frequency identification
Radio frequency identification (RFID)
radiofrequency identification
research and development
resilience
Resiliency
RFID Security Protocol
RFIDs
Transportation
biblio
Planning Method of Transportation and Power Coupled System Based on Road Expansion Model
Submitted by aekwall on Tue, 09/07/2021 - 11:19am
Couplings
pubcrawl
Scalability
Resiliency
Roads
Load modeling
coupled system
distribution network
distribution networks
Energy storage
Planning
planning method
road expansion
Transportation
Transportation network
coupled congestion control
biblio
SafeTRANS Roadmap on Safety, Security, and Certifiability of Future Man-Machine Systems
Submitted by Werner Damm on Thu, 08/12/2021 - 4:46pm
Safety
security
Transportation
PIRE
Societal Design
biblio
Panoptic Feature Pyramid Network Applications In Intelligent Traffic
Submitted by aekwall on Tue, 06/01/2021 - 1:23pm
composability
Compositionality
computational intelligence
Cryptography
intelligent transportation
Panoptic Segmentation
pubcrawl
Roads
security
Servers
styling
Traffic forecast
Transportation
Web sites
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
neural network
Transportation
Systematics
Software measurement
software architecture proposal
Software Architecture
Software
security of data
Scalability
Resiliency
pubcrawl
process control
personal data
biometric encryption
Metrics
IoT devices
Internet of Things
feature extraction
facial recognition time
facial recognition techniques
facial recognition
face recognition
encryption
data privacy
biometrics (access control)
Big Data
biblio
Miniature Water Surface Garbage Cleaning Robot
Submitted by grigby1 on Thu, 12/17/2020 - 1:55pm
transmission module
Robot
robot operating systems
robots
security
Service robots
stability
STC12C5A60S2
System software
Resiliency
Transportation
transporting garbage
unmanned driving
waste disposal
water area
Water surface garbage cleaning
WiFi
Wireless fidelity
intelligent miniature water surface garbage
cleaning
cleaning module
control engineering computing
designed robot
Hardware
Human behavior
Human Factors
intelligent control
Circuit synthesis
intelligent remote control
microcontrollers
miniature water surface garbage cleaning robot
mobile robots
policy-based governance
power module
pubcrawl
resilience
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 11:46am
cutting-edge technologies
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
vehicles
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
Transportation
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
security of data
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
biblio
End-to-end security assessment framework for connected vehicles
Submitted by aekwall on Mon, 09/28/2020 - 12:17pm
Safety
CPS Privacy
real-time crucial functionalities
hyper-connected world
heterogeneous hardware
end-to-end security assessment framework
complex electronic systems
automotive sector
cloud platforms
connected vehicles
cyber physical systems
software components
user experiences
Human Factors
edge computing
security services
security
Transportation
smart objects
privacy
Cybersecurity
Wireless communication
pubcrawl
Human behavior
cyber-physical systems
Internet of Things (IoT)
Hardware
Cloud Computing
traffic engineering computing
security of data
Automotive engineering
automobiles
biblio
Accurate Marking Method of Network Attacking Information Based on Big Data Analysis
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
resilience
network attack detection ability
network attack information nodes
network attack nodes
network attacking information
network offensive information
network security defense
open network environment
pubcrawl
Network
Resiliency
Scalability
security of data
smart cities
task scheduling method
telecommunication scheduling
Transportation
big data security in the cloud
accurate marking method
adaptive learning model
attack
attack information chain
attack information tagging
Big Data
Big Data analysis method
Big Data fusion tracking recognition
Chained Attacks
Cloud Computing
computer network security
Conferences
data analysis
information marking
learning (artificial intelligence)
Metrics
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »