Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless network
biblio
The development of the data transfer protocol in the intelligent control systems of the energy carrier parameters
Submitted by aekwall on Mon, 11/23/2020 - 11:21am
accounting of the energy carrier consumption
Intelligent Data and Security
Intelligent Data Security
Wireless Smart Sensors
wireless smart sensor
thermodynamic parameters
reliable data transmission
radio channel
intelligent control systems
heat control system
energy measurement
energy carriers
energy carrier parameters
data transfer protocol
control signals delivery
control devices
Scalability
wireless network
data transfer
security devices
intelligent control system
intelligent control
Compositionality
integrated circuits
Automation systems
Wireless communication
wireless sensor networks
pubcrawl
Resiliency
Software
Protocols
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
sparse architectures
radio networks
resilience
Resiliency
route poisoning
Routing
routing around connectivity holes
routing scheme
routing table management
Scalability
software malfunctioning
RACH
telecommunication network management
telecommunication network reliability
telecommunication network routing
telecommunication security
time series
time-series analytics
Wireless communication
wireless network
wireless nodes
wormhole attacks
failure analysis
Blackhole attack
blackhole attacks
Computational modeling
continuous analytical systems
data collection applications
Delay Optimization
delays
dense architectures
dense networks
dynamic information
back testing
historical systems
Internet of Things
IoT networks
IoT routing
Mathematical model
node failures
Path Recovery
Peer-to-peer computing
probability
pubcrawl
biblio
Research on Anomaly Intrusion Detection Technology in Wireless Network
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
Time-frequency Analysis
wireless network intrusion detection
wireless network
traffic statistical analysis model
signal fitting method
network intrusion signal model
matched filters
correlation matching filter
anomaly intrusion detection algorithm
adaptive time-frequency feature decomposition
adaptive correlation spectrum analysis method
signal-to-noise ratio
wireless networks
Intrusion Detection
SNR
statistical analysis
Analytical models
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
feature extraction
network security
Adaptation models
computer network security
biblio
Design and analysis of a mesh-based Adaptive Wireless Network-on Chips Architecture With Irregular Network Routing
Submitted by aekwall on Mon, 05/11/2020 - 11:09am
network-on-chip
Wires
Wireless Router
Wireless Network-on Chip
wireless network
Wireless communication
wireless channels
token sharing arrangement
Telephone sets
telecommunication traffic
Scalability
Resiliency
remote Network-on-Chip
remote information transmission
pubcrawl
Benchmark testing
Network-on Chip structures
network routing
network on chip security
MulticoreArchitecture
Metrics
metallic interface
mesh-based adaptive Wireless Network-on chips architecture
mesh topology
irregular Network routing
gainful remote handsets
core messages
computer architecture
Communication system security
biblio
Node Identification in Wireless Network Based on Convolutional Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
wireless network
Neural Network Security
stochastic gradient descent method
softmax model
principal component analysis
node identification
local feature extraction
convolutional neural networks
convolutional neural network
Ad-Hoc Network
gradient methods
wireless networks
computational complexity
Metrics
learning (artificial intelligence)
Ad hoc networks
deep learning
wireless sensor networks
Resiliency
resilience
policy-based governance
pubcrawl
convolutional neural nets
convolution
feature extraction
collaboration
Training
biblio
Modelling, analysis and design of active queue management to mitigate the effect of denial of service attack in wired/wireless network
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Metrics
wireless sensor networks
wireless network
wired network
Time delay
telecommunication congestion control
TCP/AQM system
stochastic systems
stabilizing control syntheses
stability
Router Systems Security
Resiliency
resilience
queue router attacks
pubcrawl
active queue management
Markovian jump linear system
Linear systems
Guaranteed cost approach
feedback control
distributed denial of service attacks
denial of service attack
delays
delay-dependent conditions
DDoS Attacks
Congestion Control
computer network security
closed-loop system
closed loop systems
AQM security
biblio
Smart and Secure Group Communication in Iot Using Exponential Based Self Healing Group Key Distribution Protocol
Submitted by grigby1 on Mon, 02/17/2020 - 5:12pm
AES algorithm
composability
Polynomial Factorization
pubcrawl
resilience
Resiliency
Self-healing Group Key Distribution
self-healing networks
wireless network
biblio
Improved Group Key Management with Host Mobility Protocol in Wireless Mobile Environment
Submitted by grigby1 on Mon, 01/27/2020 - 12:26pm
Group communication
Group key management
Human behavior
Human Factors
Metrics
mobile wireless environment
pubcrawl
resilience
Resiliency
Scalability
security
wireless network
biblio
An Enhanced Threshold Based Cryptography with Secrete Sharing and Particle Swarm Optimization for Data Sending in MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
NPSOM technique
wireless network
telecommunication security
steady particle swarm optimizer technique
Servers
security
secrete sharing method
secrete sharing
Resiliency
resilience
receiving process
pubcrawl
particle swarm optimization (PSO)
particle swarm optimization
particle swarm optimisation
optimization
Birds
new particle swarm optimization method
Monitoring
mobility management (mobile radio)
mobility features
mobile ad hoc networks
Metrics
MANET security
MANET network
MANET
Fish
enhanced threshold based cryptography
dynamic network topology
data sending process
Cryptography
Compositionality
« first
‹ previous
1
2
3
next ›
last »