Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Force
biblio
Trust in Medical Human-Robot Interactions based on Kinesthetic guidance
Submitted by
grigby1
on Tue, 12/01/2020 - 12:35pm
Robot Trust
biomechanics
Force
Human behavior
Human Factors
human-robot interaction
kinesthetic guidance
kinesthetic mitigation strategies
medical human-robot interactions
medical robotics
participant trust
patient arm
patient rehabilitation
patient-specific tasks
pubcrawl
resilience
Resiliency
Robot sensing systems
robust trust
Service robots
Task Analysis
therapeutic robot
Universal RoboTrainer
usability
usability issues
verbal mitigation strategies
biblio
Impulse Exciter of Rotating Blades With an Increased Excitation Force
Submitted by
aekwall
on Mon, 11/30/2020 - 11:15am
Blades
Compositionality
cyber physical systems
dynamic measurement and testing
electromagnetic fields
electromagnetic forces
electromagnetic vibration excitation
Electromagnets
excitation force
Excitation of vibration
Force
impulse exciter
increased excitation force
Internet of Things
Magnetic Remanence
Magnetization
Permeability
pubcrawl
remanence
remanent induction reduction
Resiliency
RLC circuits
rotating machine blade
rotating machine blades
vibration measurement
Vibrations
biblio
Concept Inventories in Cybersecurity Education: An Example from Secure Programming
Submitted by
grigby1
on Wed, 11/04/2020 - 1:01pm
computer science education
computer security
concept inventory
cyber physical systems
Cybersecurity
cybersecurity education
Cybersecurity Education Curriculum 2017 guidelines
Delphi study
education
Force
privacy
programming
Programming profession
pubcrawl
secure programming
secure programming concept inventory
security of data
testing
tools
biblio
Cybersecurity Associate Degree Program Curriculum
Submitted by
grigby1
on Wed, 11/04/2020 - 12:43pm
& Technical College
Accreditation
ACM CCECC
Associate Degree
associate degree cybersecurity programs
associate level cybersecurity workforce
community
community college educators
computer science education
computer security
CSEC2Y
curriculum
cyber physical systems
Cyber2yr
Cyber2yr work
Cybersecurity
cybersecurity associate degree program curriculum
cybersecurity education
cybersecurity education programs
educational courses
Educational institutions
Force
global cybersecurity guide
Guidelines
higher education
Junior
knowledgeable level cybersecurity workforce
privacy
professional field
pubcrawl
qualified cybersecurity workforce
security of data
student competency focused curriculum
Task Analysis
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by
aekwall
on Tue, 09/08/2020 - 9:15am
programming
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
Bandwidth
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
TCPIP
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
evolutionary design approach
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by
grigby1
on Fri, 09/04/2020 - 2:38pm
Cryptography
authorisation
Indexes
authentication
pubcrawl
Force
password
Human Factors
policy-based governance
matrix algebra
Resists
Dictionaries
Brute forcing
click pattern technique
dictionary attacks
graphichical password technique
key stroke technique
Matrix based authentication
matrix based secure authentication mechanism
password attacks
password based authentication mechanism
shoulder surfing
brute force attacks
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by
grigby1
on Fri, 09/04/2020 - 2:37pm
Servers
computer network security
Protocols
pubcrawl
Force
fuzzy set theory
network administrators
Human Factors
policy-based governance
fault detection
Clustering algorithms
clustering methods
computer network systems
computer networks
DOS brute force attacks faults detection
Fault Clustering
Fuzzy Cluster Means
Management information base
MIB feature
Network Fault Attacks
network issues
network performance
optimised fuzzy c-means
SFCM method
SNMP-MIB parameter datasets
SNMP-MIB variables
specialised MIB dataset
Subtractive Clustering
brute force attacks
biblio
High Speed Parallel RC4 Key Searching Brute Force Attack Based on FPGA
Submitted by
grigby1
on Fri, 09/04/2020 - 2:36pm
Ciphers
Cryptography
encryption
Hardware
pubcrawl
Force
process control
Human Factors
policy-based governance
field programmable gate arrays
block RAM
Brute force
clock rate
Clocks
field programmable gate array
forecast keying methods
FPGA
frequency 128 MHz
High Speed Parallel RC4 Key Searching Brute Force Attack
key searching speed
key searching unit
main controller
on-chip BRAM
random-access storage
RC4
RC4 algorithm
stream cipher
Xilinx XC3S1600E-4 FPGA device
brute force attacks
biblio
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction
Submitted by
grigby1
on Fri, 09/04/2020 - 2:25pm
Cryptography
Servers
Wireless communication
telecommunication security
pubcrawl
collaboration
Force
Human Factors
policy-based governance
AES
Brute Force Attack
fault tolerance
attacks
client side encryption
complex Random key generation algorithms
fault tolerant key generation
Fault tolerant systems
group key generation algorithms
key generation
level encryption securities
level message security
mobile ad hoc network
mobile ad hoc networks
Secure Spread Spectrum
secure spread spectrum communication
Security parameters
sensor networks
spread spectrum communication
Wireless communications
brute force attacks
biblio
Rapid prototyping of flow-based detection methods using complex event processing
Submitted by
grigby1
on Fri, 09/04/2020 - 2:25pm
security
computer network security
IP networks
Monitoring
network security
pubcrawl
collaboration
Force
Uniform resource locators
Databases
Human Factors
transport protocols
policy-based governance
Engines
CEP
complex event processing
detection method
EPL
ESPER
Event Processing Language
flow-based detection methods
multistage HTTP brute force attack detection
network attacks
network flows
SQL
SQL-like syntax
brute force attacks
1
2
3
4
5
next ›
last »