Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Transmission
biblio
MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle
Submitted by grigby1 on Fri, 04/28/2023 - 12:49pm
non-repudiation
blockchain
pubcrawl
authentication
composability
real-time systems
smart contracts
Reliability
data communication
Data Transmission
Costs
multisignature
Social Internet of Vehicles (SIoV)
biblio
Image Encryption Using Chaotic Map And Related Analysis
Submitted by grigby1 on Thu, 06/30/2022 - 5:06pm
Robustness
Henon Chaotic Map
chaotic encryption
telemedicine
Security analysis
chaotic cryptography
Data Transmission
Banking
simulation
encryption
Metrics
real-time systems
chaotic communication
Scalability
Resiliency
resilience
pubcrawl
biblio
Research on Data Transmission Security Architecture Design and Process
Submitted by grigby1 on Wed, 06/30/2021 - 3:38pm
intelligent data
system security
Servers
security
Scalability
Resiliency
resilience
pubcrawl
process control
Architecture design
information system
information security
Data Transmission
Conferences
computer architecture
Compositionality
Business
biblio
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
remote patient monitoring
Medical services
patient care
patient monitoring
patients care
Peer-to-peer computing
privacy
private medical data
pubcrawl
medical information systems
Safety
safety mechanism
Scalability
security
Skin
skincare monitoring
telemedicine
health care
cloud
Cloud Computing
Cryptography
Data protection
Data Transmission
distributed architecture
Distributed databases
expert systems
blockchain
Human Factors
Internet of Things
IoT based skin monitoring system
IoT based skin surveillance system
IoT devices
IoT monitoring
medical care
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
Synergetic Denial-of-Service
named data networking
network architecture
normal IFAs
pubcrawl
Resiliency
Resists
Scalability
SDoS attacks
security of data
IP networks
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
underwater acoustic communication
underwater sensor networks
UWSN
wireless sensor networks
denial-of-service attack
security
attacker identification
attackers synergize
computer network security
computer science
Data Transmission
delays
Denial-of-Service
Underwater Networks
denial-of-service attacks
DoS attacks
future network architectures
Human behavior
increased network traffic
Interest Flooding Attack
interest flooding attacks
internet
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
biblio
On the Large-Scale Traffic DDoS Threat of Space Backbone Network
Submitted by grigby1 on Tue, 12/01/2020 - 1:46pm
satellite networks
pubcrawl
reflection
reflection amplification attack
reflection amplification attacks
resilience
Resiliency
satellite communication
satellite network
large-scale traffic DDoS threat
Satellites
service delivery
space backbone network
space communication links
Space vehicles
telecommunication traffic
terminal devices
Bandwidth
intrusion detection system
internet
IDS
ground networks
global coverage
denial-of-service attack
defense
DDoS attackers
DDoS
Data Transmission
data communication
computer network security
Computer crime
composability
bandwidth resource
1
2
3
4
next ›
last »