Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Software Architecture
biblio
BBS: Micro-Architecture Benchmarking Blockchain Systems through Machine Learning and Fuzzy Set
Submitted by aekwall on Mon, 01/18/2021 - 10:27am
Scalability
Cryptography
Protocols
computer architecture
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
blockchain
Performance
Distributed databases
Measurement
fuzzy set theory
Software Architecture
Benchmark testing
Traceability
Fabrics
decentralization
BBS
Benchmarking
Blockbench
Caliper
irreversibility
micro architecture
microarchitecture benchmarking blockchain systems
Workload Characterization
Fuzzy Cryptography
biblio
Systems Engineering Architecture Framework for Physical Protection Systems
Submitted by aekwall on Mon, 01/11/2021 - 12:39pm
architecture
Architecture Framework
computer architecture
Deterrence
Human behavior
modeling
Physical Protection Systems
pubcrawl
Resiliency
Scalability
Software Architecture
Stakeholders
Systems architecture
systems engineering
Systems engineering and theory
biblio
Neural Network and ROS based Threat Detection and Patrolling Assistance
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
autonomous navigation
autonomously moving bots
Cameras
computer architecture
computer vision
computer vision algorithms
control engineering computing
convolutional neural networks
daily ergonomics
ergonomics
hardware components
Human behavior
Human Factors
Lasers
mobile robots
navigation
neural nets
neural network
object detection
operating systems (computers)
patrolling assistance
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System
robot operating systems
robot vision
Robot vision systems
robotic automation
ROS based threat detection
security
Service robots
Software Architecture
software architecture design
Weapons
YOLO
biblio
Secured Architecture for Unmanned Surface Vehicle Fleets Management and Control
Submitted by grigby1 on Tue, 12/15/2020 - 12:43pm
computer architecture
control engineering computing
Control System
cyber-physical systems
environmental monitoring
Human behavior
Human Factors
Marine vehicles
mobile robots
Monitoring
policy-based governance
pubcrawl
remotely operated vehicles
resilience
Resiliency
risky weather conditions
robot operating systems
SCADA
SCADA systems
Sea surface
search and rescue operations
secured architecture
security
security of data
Software Architecture
Task Analysis
unmanned surface vehicle fleets control
unmanned surface vehicle fleets management
unmanned surface vehicles
unmanned vehicles
USV
water cleaning
biblio
Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data
Submitted by grigby1 on Fri, 12/11/2020 - 1:59pm
Chemicals
Compositionality
data authenticity
data fixity
data integrity
data intensive scientific discovery
digital preservation
digital signature
digital signatures
e-science
format migration
format verification
Grammar
mapping rules
meta data
metadata
Metadata Discovery Problem
object transformation
PREMIS
preservation metadata
pubcrawl
resilience
Resiliency
Scalability
scientific information systems
Software
Software Architecture
system architecture
Systems architecture
valuable scientific data
biblio
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT
Submitted by grigby1 on Tue, 11/17/2020 - 1:50pm
application traffic
dispersed computing
dispersed computing applications
dynamic overlay system
dynamic path optimization
dynamic transport overlay system
Human Factors
internet
Internet of battlefield things
Internet of Things
iobt
IP networks
mission-oriented dispersed computing
Nebula's overlay system
Network Backhaul Layered Architecture system
network computation points
network discovery
networking conditions
NRL CORE network emulator
online learning
overlay
overlay tunnels
Path optimization
planner
protocol synthesis
pubcrawl
QoS monitoring
quality of service
Scalability
Software Architecture
telecommunication traffic
transport protocols
transport service needs
tunnel transport protocol optimization
tunnels
biblio
Safe and Secure Data Fusion — Use of MILS Multicore Architecture to Reduce Cyber Threats
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
telecommunication security
Resiliency
pubcrawl
Software Architecture
sensor fusion
data flows
aerospace computing
safety-critical software
scheduling
operating systems (computers)
security risks
multiprocessing systems
MILS
air traffic safety
architecture configurations
civil aircraft systems safety
covert channel prevention
cyber threats reduction
cyber-attack space
data fusion-based systems
flexible software architectures
functional assurance capabilities
High Robustness
high-robustness separation kernel certification
INTEGRITY-178 tuMP
MILS multicore architecture
multicore
multicore processor
multicore-based real-time operating system
multiple independent levels
restricted hardware access
RTOS
Separation Kernel
single-core processors
system providers
system security architecture
Resilient Security Architectures
biblio
Modeling and Analysis Cyber Threats in Power Systems Using Architecture Analysis Design Language (AADL)
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
security of data
cyber-physical systems
Resiliency
pubcrawl
cyber-physical security
Software Architecture
power engineering computing
power system security
power grids
program verification
power systems
cyber threats
verification techniques
Power Grid
specification languages
AADL
Architecture Analysis & Design Language
cyber-grid components
cyber-physical model
cyber-physical modeling capabilities
false data injection attacks
FDI attack
Model-based analysis
power system information models
Power systems security
switching attack
Resilient Security Architectures
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
Safety
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Software Architecture
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
functional-level security requirements
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
system life cycle
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
security
security of data
critical infrastructure
critical infrastructures
Resiliency
pubcrawl
vulnerabilities
Companies
Government
Software Architecture
5G mobile communication
resilience
Telecommunications
threats
Communications
security approach
disasters
natural disasters
criminal attacks
extreme weather events
holistic situation awareness
RESISTO H2020 EU-funded project
risk mitigation
telecom infrastructures
Resilient Security Architectures
1
2
3
4
5
6
7
8
next ›
last »