Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless LAN
biblio
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection
Submitted by grigby1 on Fri, 03/15/2019 - 11:53am
pubcrawl
wireless LAN
wireless Internet environment
wireless integrated environment
Wireless fidelity
Wireless communication
wireless AP security
Wi-Fi
unauthorized AP
unauthorized Access Point detection
threat vectors
Support vector machines
support vector machine
security
RTT value data
Classification algorithms
protection
privacy
Prediction algorithms
multilayer perceptrons
military facilities
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
information protection
hacking attacks
detection
computer network security
biblio
Signal Distribution Optimization for Cabin Visible Light Communications by Using Weighted Search Bat Algorithm
Submitted by grigby1 on Mon, 11/19/2018 - 12:35pm
particle swarm optimisation
WSBA
wireless local area network
wireless LAN
weighted search bat algorithm
VLC
Visible Light Communications Security
visible light communication
Signal to noise ratio
security
search problems
Scalability
Resiliency
resilience
pubcrawl
particle swarm optimization
bat algorithm
optimization
optimal power adjustment factors
optical signals
optical receivers
Optical filters
nonoptimized signal distribution optimization
Metrics
light emitting diodes
high-quality network service
genetic algorithms
genetic algorithm
free-space optical communication
coverage optimization
cabin visible light communication system
cabin communication
biblio
Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
resilience
wireless network vulnerabilities
wireless LAN
wireless
Wi-Fi network
Vulnerability
transitions probabilities
telecommunication security
smart power grids
Smart Grid Sensors
smart grid comprehensive analysis
Smart Grid
security of data
security levels
Resiliency
Compositionality
pubcrawl
probability density
probability
power system security
network attacks
network administrators
Markov processes
Markov Chain model
markov chain
Human Factors
Human behavior
CVE
computer network security
biblio
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network
Submitted by grigby1 on Fri, 10/26/2018 - 4:53pm
INFECT
wireless openaccess research platform
wireless LAN
Trojan horses
Signal to noise ratio
security
Scalability
Robustness
Resiliency
radio transmitters
radio receivers
radio networks
pubcrawl
802.11a/g transmitter
inconspicuous FEC-based trojan
hardware attack
forward error correction
FEC encoding
Decoding
Contamination
channel noise profiling
channel noise
channel coding
Binary phase shift keying
802.11a/g wireless network
biblio
Control systems and the internet of things \#x2014; Shrinking the factory
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
pubcrawl
Logic gates
Monitoring
network capable computer
passive infrared detectors
powerful ARM processor
Production facilities
programmable I-O interface
programming interfaces
Lips
Radio network
Raspberry Pi
Scalability
sensor network
sensors
smart interconnected society
user interfaces
wireless LAN
feedback mechanisms
component
control loop
control systems
control-monitoring systems
domestic Internet solution
factory automation
factory control systems
Factory System
battery life
I-O Systems
i-o systems security
industrial control
infrared detectors
Interfaces
internet
Internet of Things
IoT
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
CodeRepair: PHY-layer partial packet recovery without the pain
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
lossy 802.11 links
wireless LAN
single parity code
Reflective binary codes
Receivers
Protocols
practical coding-based protocol
PHY layer
partially corrupted packets
parity check codes
padded parities
packet recovery approaches
OFDM
802.11 networks
IEEE 802.11 Standard
forward error correction
Error Recovery
error correction
error correcting capability
erroneous coded bits
end-to-end link goodput
Decoding
Convolutional codes
convolutional code
CodeRepair
coded bit errors
1536086
biblio
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
Power demand
wireless LAN
WiFi energy consumption
WiFi broadcast frames
Unicast
trace-driven simulation
telecommunication traffic
telecommunication power management
suspend mode
smartphone energy saving
smart phones
Protocols
AP-assisted broadcast traffic management
Ports (Computers)
packet round-trip time
Nexus One
network capacity
IEEE 802.11 Standard
high power active mode
HIDE system
energy consumption
energy conservation
computer network management
Central Processing Unit
1536086
biblio
EliMO: Eliminating Channel Feedback from MIMO
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
FTF
wireless LAN
WiFi station
WiFi networks
two-way channel estimation
Throughput
STA
Signal to noise ratio
Receivers
multiple-input multiple-output networks
MIMO communication
MIMO beamforming
MIMO
implicit feedback
access points
feedback training field
explicit feedback
EliMO
downlink training symbols
downlink CSI
Downlink
communication overhead
channel state information feedback
channel feedback elimination
Channel estimation
array signal processing
AP
1536086
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
« first
‹ previous
1
2
3
4
5
6
next ›
last »