Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless LAN
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
mobile devices security breaches
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
wireless LAN
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
computer network security
tracking
mobile radio
smart phones
Metrics
privacy
Mobile handsets
location privacy
pubcrawl
Human behavior
Resiliency
Protocols
IoT devices
Internet of Things
data privacy
Monitoring
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
pubcrawl
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
indoor localization
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
differential privacy guarantee
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
Computing Theory
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
biblio
Wireless Self-Organizing Wi-Fi and Bluetooth based Network For Internet Of Things
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
Bluetooth
bluetooth security
wireless self-organizing Wi-Fi
wireless LAN
Wi-Fi network
Wi-Fi
transmission channels
telecommunication power management
self-organizing networks
open standards
modems
energy-saving modes
energy conservation
Cyber Physical System
Internet of Things
power consumption
cyber physical systems
Wireless fidelity
Routing
wireless networks
wireless channels
Human behavior
resilience
Resiliency
composability
pubcrawl
Power demand
Switches
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
biblio
High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
radio networks
link adaptation
low-density parity-check codes
modulation
modulation and coding schemes
modulation coding
multiple MCS rates
parity check codes
pubcrawl
Information hiding
resilience
Resiliency
Scalability
Throughput
underlying communication system
Wireless communication
wireless LAN
wireless local area network modulation
directional multi-Gigabit (DMG)
adaptive rate wireless communication systems
channel capacity
coding schemes
composability
Compositionality
covert channel performance
covert channel throughput
covert channels
adaptation mechanisms
embedding techniques
error statistics
forward error correction
forward error correction-based information hiding technique
generalized information hiding model
high-throughput covert channels
IEEE 802.11ad WLAN
biblio
Enterprise WiFi Hotspot Authentication with Hybrid Encryption on NFC- Enabled Smartphones
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
smartphone
NFC- enabled smartphones
personally owned devices
pubcrawl
resilience
Resiliency
resources access
Servers
smart phones
network security
user authentication
Wi-Fi network
Wireless fidelity
wireless LAN
wireless local area network
WPA2 Enterprise
WPA2-802.1X model
authentication
Near Field Communication
multifactor authentication
Multi-factor authentication
Metrics
hybrid encryption
hybrid cryptosystem
Human Factors
Human behavior
Enterprise WiFi hotspot authentication
enterprise Wi-Fi hotspot authentication
encryption
Cryptography
connectivity
company information
business data transmission
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
biblio
Enhance Wireless Security System Using Butterfly Network Coding Algorithm
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
IoT system
wireless sensing network
wireless security system
Wi-Fi module
traditional security system
system indicators
Received signal strength indication (RSSI)
received signal strength indication
network transmission
Network node routing
butterfly network coding algorithm
Butterfly network coding (BNC) algorithm
cyber physical systems
telecommunication security
encoding
network coding
Predictive Metrics
security monitoring
wireless LAN
Decoding
RSSI
wireless sensor networks
composability
pubcrawl
Resiliency
Internet of Things (IoT)
« first
‹ previous
1
2
3
4
5
6
next ›
last »