Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
middleware
biblio
Research on Intelligent Security Protection of Privacy Data in Government Cyberspace
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
agent-based intelligent masking middleware
automatic execution
automatic recommendation
big data privacy
categorization and classification
Classification algorithms
data analysis
data masking algorithm
Data models
data privacy
data source
dynamic masking
Government
government cyberspace
government data masking process
government data processing
government privacy data
government unstructured text
Human behavior
improved masking process
intelligent discovery
intelligent security protection
learning (artificial intelligence)
machine learning
Metrics
middleware
NLP
open systems
privacy protection
protection efficiency
pubcrawl
resilience
Resiliency
Scalability
security
sensitive data discovery
static masking
structured privacy data
unstructured privacy data
biblio
Cyber Security Assessment of the Robot Operating System 2 for Aerial Networks
Submitted by grigby1 on Thu, 12/17/2020 - 12:36pm
aerial networks
authentication
autonomous aerial vehicles
autonomous systems
control engineering computing
Cryptography
cyber security
cyber security assessment
Data Distribution Service standard
DDS security architecture
DDS standard
drones
encryption
GCS
ground control station
Human behavior
Human Factors
middleware
military computing
military grade unmanned systems
military systems
military-centric robotics platform
mobile robots
operating systems (computers)
policy-based governance
pubcrawl
resilience
Resiliency
Robot Operating System 2
robot operating systems
robot programming
robotic middleware
robots
ROS
ROS 1 security vulnerabilities
ROS 2
security
standards
UAV swarms
unmanned Naval aerial swarms
biblio
Hardening ROS via Hardware-assisted Trusted Execution Environment
Submitted by grigby1 on Tue, 12/15/2020 - 12:42pm
bodily harm
complex cyber-physical systems
control engineering computing
CPS
cyber-physical systems
data privacy
education
entertainment
Hardware
hardware-assisted trusted execution environment
Human behavior
Human Factors
Humanoid robots
middleware
operating systems (computers)
policy-based governance
pubcrawl
resilience
Resiliency
robot behavior
robot design phase
Robot Operating System
robot operating systems
robot programming
Robot sensing systems
ROS
security
biblio
Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment
Submitted by grigby1 on Tue, 11/17/2020 - 1:58pm
battlefield scenarios
Big Data
Bridges
heterogeneous IoBT devices
Human Factors
innovative paradigm
innovative solutions
Internet of battlefield things
Internet of Things
interoperability
interoperable control
iobt
IoT
machine learning
middleware
military systems
multi-robot systems
multiforce cooperation
multiforce environment
network management
Object recognition
open systems
process control
pubcrawl
resilience
Resiliency
Scalability
sensors
tactical networks
biblio
A Multi-Agent Middleware for Resilience Enhancement in Heterogeneous Control Systems
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
computer network security
IP networks
security
Resiliency
pubcrawl
wireless sensor networks
Protocols
multi-agent systems
resilience
communication protocols
middleware
sensors
telecommunication control
heterogeneous devices
actuators
physical world
distributed control
networked control systems
multiagent framework
resilience enhancement
constituent agents
cyber disturbances
cyber space
cyber vulnerabilities
distributed middleware
ensures state
heterogeneous control systems
heterogeneous networked control systems environments
minimum level
modern computing networks
multiagent middleware
networking technologies
physical disturbances
Resilient Security Architectures
biblio
Resilience Enhancement through a Multi-agent Approach over Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:11pm
actuators
communication platforms
computer architecture
control systems
CPS resilience
cyber physical systems
cyber space perspective
cyber vulnerabilities
cyber-physical systems
distributed devices
information technologies
information technology
IP networks
IPv6 test-bed
middleware
Monitoring
multi-agent systems
multiagent approach
multiagent framework
physical disturbances
pubcrawl
resilience
resilience enhancement
Resiliency
sensors
tangible physical world
ubiquitous computing
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
computer network security
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
wireless sensor networks
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
cyber world
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
CPS infrastructure
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
biblio
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:01am
IoT
Cloud Computing
Scalability
data privacy
privacy concerns
Internet of Things
Resiliency
Human behavior
pubcrawl
Protocols
middleware
Data Transmission
Fog computing
Data models
data management
fog nodes
edge devices
queueing theory
telemetry
Advanced Message Queuing Protocol
data management portfolio
data portfolio
Data Privacy for Fog-to-Cloud (DPPforF2C)
data service model
DPPforF2C
fog architecture
fog-to-cloud computing systems
Message Queuing Telemetry Transport
practical data model
privacy architecture
sample data models
Computing Theory and Privacy
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
programming
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
Bandwidth
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
TCPIP
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
evolutionary design approach
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
privacy
security of data
pubcrawl
Human behavior
Hardware
telecommunication security
security
Scalability
quality of service
mobile computing
Ad hoc networks
telecommunication network management
Data Security
middleware
resilience
data distribution
augmented reality
ubiquitous computing
computer games
Large-scale systems
pervasive computing
ad-hoc networking
consistency
Context-aware services
Data replication
Dynamic Configuration
entertainment
gaming
geospatial location
geospatial orientation
mobile entertainment
multimedia computing
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive entertainment
Pervasive networking
quality management
service management
1
2
3
4
5
6
7
8
9
next ›
last »