Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Preserve Location Privacy for Cyber-Physical Systems with Addresses Hashing at Data Link Layer
Submitted by aekwall on Mon, 10/26/2020 - 10:55am
Wireless communication
Location Privacy in Wireless Networks
stronger privacy protection
power efficiency
media access control
data link layer frame
cyber-physical system
Compositionality
Payloads
wireless medium
sensors
Metrics
Cryptography
Routing
privacy
location privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
cyber-physical systems
telecommunication security
Receivers
biblio
Using of an anonymous communication in e-government services: In the prevention of passive attacks on a network
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
government data processing
telecommunication security
security
Resiliency
resilience
Receivers
pubcrawl
Protocols
policy-based governance
passive attacks prevention
networking
network attacks
Monitoring
anonymous communication
Electronic government
e-government services
E-Government
digital participation
Delta
Data protection
Cybersecurity
communication technologies
Communication networks
commerce
collaboration
auctions
biblio
A radio-fingerprinting-based vehicle classification system for intelligent traffic control in smart cities
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
precise vehicle classification
comprehensive measurements
cost-efficiency
dynamic control methods
dynamic type-specific lane assignments
global system parameters
highly sophisticated traffic control methods
highly-dynamic Cyber Physical System
individual vehicles
intelligent traffic control systems
key element
machine learning based approach
key performance indicators
radio-fingerprint
radio-fingerprinting
real-time
road traffic control
specific data
street network
Traffic flow
up-to-date traffic
vehicle classification system
vehicle type information
CPS Privacy
vehicular ad hoc networks
traffic engineering computing
data privacy
Receivers
Measurement
Support vector machines
feature extraction
learning (artificial intelligence)
Human behavior
pubcrawl
privacy preservation
Roads
road vehicles
pattern classification
machine learning
privacy
cyber physical systems
Human Factors
smart cities
system state
CPS
System performance
radio transmitters
biblio
Physical Layer Security of a Two-Hop Mixed RF-FSO System in a Cognitive Radio Network
Submitted by grigby1 on Fri, 09/18/2020 - 12:55pm
physical layer security
dual-hop transmission
end-to-end signal-to-noise-ratio
free space optical link
FSO
FSO links
gamma distribution
Gamma-Gamma distribution
licensed primary user
Nakagami channels
optical links
cognitive-radio system
physical layer security performance
PU receiver
relay
relaying
RF links
secrecy outage probability
two-hop mixed RF-FSO system
unlicensed secondary user
Cognitive Radio Security
cooperative communication
pubcrawl
resilience
Resiliency
Radio frequency
telecommunication security
Signal to noise ratio
Receivers
probability
telecommunication network reliability
Capacity planning
security
Relays
Rayleigh channels
Interference
cognitive radio
amplify and forward communication
asymmetric radio frequency link
atmospheric turbulence
average secrecy capacity
Cognitive Radio Network
biblio
Density Imaging Using a Compressive Sampling DBIM approach
Submitted by aekwall on Mon, 09/14/2020 - 11:29am
Inverse Problems
Ultrasound tomography
Ultrasonic variables measurement
ultrasonic imaging
Transmitters
Tomography
Resiliency
Receivers
pubcrawl
privacy
microwave imaging
medical image processing
measurement systems
measurement system
Iterative methods
inverse scattering
composability
imaging time
image recovery quality
Image reconstruction
Image quality
Image coding
Distorted Born iterative method (DBIM)
distorted Born iterative method
density information
density imaging
DBIM method
cyber-physical systems
compressive sampling technique
compressive sampling DBIM approach
compressive sampling (CS)
compressive sampling
biblio
ObliComm: Towards Building an Efficient Oblivious Communication System
Submitted by aekwall on Mon, 09/14/2020 - 11:27am
Servers
Receivers
security
pubcrawl
metadata
network topology
Scalability
Communication Systems
anonymous communication
horizontal scaling
modular framework
queuing theory
composability
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
chaotic algorithm
wireless mobile communication
voice encryption
voice data security
trunked radio
telecommunication technology
security systems
multiple circular chaotic permutation
multiple circular
multicircular permutations
military radio
GSM network
Global System for Mobile
end-to-end voice encryption
dynamic keys
Cryptography
cellular technologies
voice communication
chaotic cryptography
chaotic communication
Predictive Metrics
GSM
cellular radio
composability
pubcrawl
Resiliency
telecommunication security
Receivers
encryption
biblio
Extrinsic Information Transfer (EXIT) Analysis for Short Polar Codes
Submitted by aekwall on Tue, 09/08/2020 - 9:05am
iterative decoding
wireless channels
short polar codes
Resiliency
Receivers
pubcrawl
polarized channels
polar codes
parity check codes
Noise measurement
noieseless channels
Mutual information
Metrics
low density parity check codes
coding theory
information theory
information bit
frozen bit
extrinsic information transfer analysis
EXIT chart
error correction codes
Decoding
composability
completely noisy channels
channel coding
channel capacity
5G mobile communication
security
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
security
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
maritime sector
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
AIS
marine navigation
marine communication
legislation
Human behavior
governments
Europe
data quality
conceptual countermeasures
collision avoidance
Coast Guard
automatic identification system
Attack vectors
Artificial Intelligence
AIS networks
AIS data
biblio
Asymmetric Physical Layer Encryption for Wireless Communications
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
quantisation (signal)
Wireless communications
quantized information entropy
private channel
possible eavesdroppers
orthogonal frequency-division multiplexing (OFDM)
cryptographic primitive
constellation confusion degree
complex-domain signals
asymmetric PLE
asymmetric physical layer encryption scheme
Asymmetric Encryption
radio receivers
Wireless communication
wireless channels
encryption
Compositionality
Elliptic curve cryptography
physical layer security
Physical layer
public key cryptography
error statistics
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
telecommunication security
Receivers
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »