Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless network
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
biblio
Channel Spoofer: Defeating Channel Variability and Unpredictability
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
pubcrawl
composability
physical layer security
resilience
Metrics
wireless network
Resiliency
channel reciprocity
biblio
Enhancing security for load balanced energy enhanced clustered bee ad hoc network using secret public keys
Submitted by grigby1 on Fri, 02/02/2018 - 1:14pm
pubcrawl
wireless network
telecommunication security
Security Public Key Cryptography
security
secured PKI scheme
secret public keys
Routing protocols
Routing
resource allocation
Resiliency
public key cryptography
Ad Hoc Network Security
path selection
mobile ad hoc networks
mobile ad hoc network
MANET
load balanced energy enhanced clustered bee ad hoc network
LBEE
Human Factors
Human behavior
Energy Efficiency
composability
biblio
Distributed Communication in Bare-bones Wireless Networks
Submitted by grigby1 on Tue, 10/03/2017 - 11:52am
backbone structure
broadcast
composability
Knowledge
Metrics
pubcrawl
Resiliency
security
signal-to-interference-plus-noise ratio
wireless mesh network
Wireless Mesh Network Security
wireless mesh networks
wireless network
biblio
"Multi-path Based Avoidance Routing in Wireless Networks"
Submitted by grigby1 on Tue, 02/14/2017 - 12:52pm
multipath message avoidance routing protocol
wireless network
speedy advancement
secure communication
Routing protocols
Routing
radio networks
pubcrawl170102
network coding
coding scheme
multipath channels
MPAR protocol
encryption
encoding
electronic messaging
data encryption
Cryptographic Protocols
computer hardware
biblio
Spatial Modulation for Generalized MIMO: Challenges, Opportunities, and Implementation
Submitted by BrandonB on Tue, 05/05/2015 - 9:57am
single-radio-frequency large-scale MIMO communications
network-coded cooperative wireless networks
next generation networks
next-generation cellular networks
optical wireless communications
power-efficient communications
relay-aided communications
relay-aided wireless communications
single-radio-frequency (RF) multiantenna systems
multiantenna wireless systems
SM-MIMO research
spatial modulation
Spatial resolution
testbed implementation
Tutorials
wireless network
wireless system design
heterogenous cellular networks
beneficial transmission paradigm
cellular radio
cooperative communications
energy conservation
Energy Efficiency
generalized MIMO
generalized multiple-input-multiple-output technologies
Green and sustainable wireless communications
area spectral efficiency
large-scale multiantenna systems
MIMO
MIMO communication
MIMO system
mobile communication research
mobile data traffic
modulation
biblio
Robust security network association adjusted hybrid authentication schema
Submitted by BrandonB on Tue, 05/05/2015 - 8:44am
monitoring mechanism
wireless vulnerability situation
wireless network
Wireless Intrusion Prevention System
Wireless Intrusion Detection System
Wireless communication
Wired Equivalent Privacy
weak authentication
telecommunication security
Servers
Robustness
robust security network association
Robust Secure Network
radio networks
Network Access Protection
802.11 standards
message authentication
IEEE standards
IEEE security standard
hybrid authentication schema
extensible authentication protocol
encryption
Cryptography
Communication system security
authorization
authorisation
authentication
accounting mechanism
802.1X framework
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
« first
‹ previous
1
2
3