Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
National security
biblio
America's Supply Chains
Submitted by willirn1 on Tue, 10/26/2021 - 3:27pm
Executive Order
supply chains
C3E
National security
cyber-attacks
critical infrastructure
manufacturing
biblio
An Investigation of High-Throughput Biometric Systems: Results of the 2018 Department of Homeland Security Biometric Technology Rally
Submitted by grigby1 on Wed, 11/04/2020 - 1:34pm
Metrics
user satisfaction metrics
US government
unmanned face
unmanned biometric systems
U.S. Department
traveler identification
Throughput
testing
Terrorism
security of data
Science and Technology Directorate
pubcrawl
National security
metrics testing
2018 Biometric Technology Rally
Measurement
measured throughput
measured performance
MdTF
matching capability
Maryland Test Facility
Iris recognition
homeland security biometric technology rally
high-throughput security environment
high-throughput biometric systems
face-iris systems
Face
DHS S-T affiliated bio-metrics
capture capability
biblio
A Cyber-Physical Interaction Model Based Impact Assessment of Cyberattacks for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
Acceleration
IoV protection
IoV cyberattacks
intelligence traffic systems
impact assessment
economy development
cyberphysical interaction
cyber layer
attack impact
cyber physical systems
Internet of Vehicles
ITS
Intelligent Transportation Systems
National security
security of data
Human Factors
Physical layer
Mathematical model
Cybersecurity
Analytical models
Metrics
Roads
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Internet of Things
Computer crime
biblio
Countering Cybersecurity and Counterfeit Material Threats in Test Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:35am
mission critical electronics
AS5553
ATE system
ATEasy
commercial-off-the-shelf instrumentation
cybersecurity issue
LXI
military products
missile assemblies
aerospace products
secure software-based system
Security Technical Implementation Guide (STIG)
test development environment
test parameters
test sequences
TPS
undetected data breach
UUT
electronic warfare
data integrity
invasive software
Resiliency
pubcrawl
composability
Cybersecurity
program testing
Automated Secure Software Engineering
Data Security
ATE
automatic test equipment
malware
National security
automatic test software
automatic test systems
AD9100D
biblio
Detection of False Data Injection Attacks in Cyber-Physical Systems using Dynamic Invariants
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Power system dynamics
Kalman filters
learning (artificial intelligence)
Meters
Metrics
National security
power engineering computing
Power measurement
power system
Kalman filter
power system security
pubcrawl
Resiliency
robust estimation
Scalability
security of data
state estimation
traditional anomaly detection approaches
data-driven temporal causal relationships
adaptive filtering
adaptive robust thresholding
Anomaly Detection
bad data detection
Bayesian filtering
complex cyber-physical systems
cyber-physical systems
data-driven functional relationships
False Data Detection
dynamic invariant network
false data injection attack detection
false data injection attacks
G-KART
Granger causality based Kalman filter
graph theory
invariant graph
Jacobian matrices
biblio
Critical Infrastructure Security: Alignment of Views
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
Europe
Damage Assessment
protection of critical infrastructure
intergovernmental national views
informational space
information environment
cyber environment
critical infrastructure security
common cyberspace
air gap
critical information infrastructure
security
National security
Cyberspace
computer security
pubcrawl
Resiliency
information security
critical infrastructures
critical infrastructure
security of data
biblio
Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
automated damage assessment
Damage Assessment
sUAS
small unmanned aircraft systems
post-disaster response
optical radar
online mapping technique
natural disasters
lidar
Laser radar
Infrastructure Inspection
Homeland Security
Inspection
—sUAS
disasters
Aircraft
Bridges
National security
autonomous aerial vehicles
Three-dimensional displays
Cameras
pubcrawl
Resiliency
critical infrastructure
biblio
Model of optimization of arrangement of video surveillance means with regard to ensuring their own security
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
nonlinear Boolean programming
video surveillance system
video surveillance equipment
video surveillance arrangement
video surveillance
security of video surveillance means
security
Safety
safe city
Resiliency
pubcrawl
nonlinear programming
arrangement optimization
National security
Metrics
illegal actions
Human behavior
damage minimization
crime prevention
crime detection
continuous visual monitoring
closed circuit television
Boolean functions
biblio
Maritime Situational Awareness Forensics Tools for a Common Information Sharing Environment (CISE)
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
National security
information management
integrated systems laboratory
ISL
learning (artificial intelligence)
marine engineering
maritime security
Maritime Surveillance
maritime surveillance systems
maritime traffic
Metrics
MS
Hellenic CISE
National Situational Picture Management system
NSPM system
pubcrawl
resilience
Resiliency
security of data
situational awareness
surveillance
time filtering
tools
corresponding national legacy systems
AIS
Artificial Intelligence
automatic identification system
C2I system
CISE
Command
command and control systems
common information sharing environment
composability
control
control-command-information system
AI
CY-CISE projects
Cypriot CISE
Databases
deep learning
Distributed CISE database
EU Member States
Europe
Forensics
forensics tools
fusion algorithms
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
1
2
3
next ›
last »