Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
delays
biblio
AutoVFlow: Autonomous Virtualization for Wide-Area OpenFlow Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
Ports (Computers)
wide-area OpenFlow networks
wide-area network applications
wide-area network
wide area networks
Virtualization
virtualisation
Substrates
substrate network
Aerospace electronics
flow space virtualization
flow space
delays
control systems
clean-slate network design
AutoVFlow mechanism
autonomous virtualization
biblio
Cellular Vehicular Networks (CVN): ProSe-Based ITS in Advanced 4G Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
Intelligent Transportation Systems
vehicles
vehicle-to-vehicle/infrastructure
V2X communications
radio access networks
proximity services
Protocols
ProSe
next generation cellular networks
LTE core network
LTE based device-to-device
LTE
Logic gates
ITS
4G mobile communication
dynamic clusters
distributed ProSe architecture
delays
D2D communications
D2D
CVN core network
CVN
Clustering algorithms
clustering
cellular vehicular networks
cellular radio
authorization
advanced 4G networks
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
biblio
OSAP: Optimal-cluster-based source anonymity protocol in delay-sensitive wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:47pm
network traffic
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
source anonymity
security
real event report latency
Protocols
OSAP
optimal cluster based source anonymity protocol
network traffic reduction
Base stations
mobile computing
Mobile communication
global attacker
fake packet injection
event source location privacy
event source anonymity
delays
delay sensitive wireless sensor networks
data privacy
cluster-based wireless sensor network
challenging attack model
biblio
An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Submitted by BrandonB on Mon, 05/04/2015 - 1:46pm
phantom source
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication power management
Routing protocols
Routing
privacy preservation
privacy
Phantoms
asset monitoring
phantom node
Monitoring
fake packet injection technique
energy efficient routing technique
energy conservation
endangered species monitoring
delays
data privacy
Base stations
base station
biblio
Content and network-aware multicast over wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
network coding
wireless networks
wireless mesh networks
video multicast service
video multicast application
Video communication
telecommunication network reliability
Streaming media
redundancy allocation algorithm
Redundancy
Receivers
network-aware multicast communication
network node allocation
Bandwidth
multicast communication
high priority video packet delivery
error prone wireless mesh network
end-to-end performance
delays
data multicast application
data communication
content-aware multicast communication
content and network-aware redundancy allocation
channel status
channel coding
channel bandwidth
biblio
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
QoS violation
wireless mesh networks
Wireless communication
traffic type
traffic sending rate
traffic regulation scheme
traffic load scale
Throughput
telecommunication traffic
telecommunication congestion control
static routers
regulation process
real-time systems
queuing delays
queueing theory
quality of service
Ad hoc networks
QoS requirements
Protocols
network state
multimedia support
mobile ad hoc networks
mesh routers
Load management
lightly loaded buffers
interval type-2 fuzzy logic system
heavy traffic load
fuzzy control
delays
dedicated QoS protocols
buffer evolution
biblio
Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:42am
radio aware optimized link state routing
WMN
wireless mesh networks
topology control
telecommunication network topology
telecommunication control
security mechanisms
security
Routing protocols
Routing Protocol
Routing
Cryptography
network simulator-3 simulations
IEEE 802.11 Standards
identity based encryption
IBE-RAOLSR protocols
IBE
hello messages
elliptic curve digital signature algorithm
ECDSA-RAOLSR protocols
digital signatures
delays
biblio
A secure and unclonable embedded system using instruction-level PUF authentication
Submitted by BrandonB on Thu, 04/30/2015 - 2:26pm
Benchmark testing
delays
embedded systems
field programmable gate arrays
instruction-level PUF authentication
microprocessor chips
processor execution environment
secure embedded system
security
unclonable embedded system
Xilinx Spartan6-based FPGA board
biblio
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
Submitted by BrandonB on Thu, 04/30/2015 - 2:24pm
spread spectrum systems
primary security threat
probability
radio interference broadcast
radio networks
radiofrequency interference
Receivers
Smart Grid
smart grid application
smart grid communication
Smart Grids
smart power grids
power system security
TACT
telecommunication security
telecommunication traffic
transmitting adaptive camouflage traffic
U-shaped function
well-adopted attack model
wireless communication security
wireless network deployment
wireless networks
worst-case message delay
Jamming
code channel
Communication system security
control messages
cyber-physical system
delay performance guarantee
delays
existing attack model
generic jamming process
information exchange
information technologies
camouflage traffic
jamming attack
jamming attacks
jamming resilience
latency guarantee
message delay minimization
multiple-frequency channel
network load balance
network traffic load
Power distibution
power infrastructures
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
next ›
last »