Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Research on Point-To-Point Encryption Method of Power System Communication Data Based on Block Chain Technology
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
asymmetric key encryption
transfer key
public key distribution scheme
power system communication data
point-to-point encryption method
point-to-point encryption
encryption identifier
Design Method
data block
communication data point
communication data encryption methods
communication data content
communication data
block chain technology
encryption
Asymmetric Encryption
Compositionality
power systems
power system stability
blockchain technology
public key cryptography
Public key
Distributed databases
Metrics
pubcrawl
Human behavior
Resiliency
Receivers
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
light emitting diodes
synchronization message
synchronization deviation
on-board communications
counter value
counter synchronization method
CAN
controller area networks
Security Evaluation
automobile security
replay attack
DoS attack
Automotive engineering
controller area network security
message authentication
Synchronization
synchronisation
pubcrawl
Resiliency
cyber-physical systems
Receivers
Internet of Things
Conferences
computer network security
biblio
Covert Communications in Packet Collision Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
sophisticated receiver
pubcrawl
random access MAC
random access system
Receivers
resilience
Resiliency
Scalability
security
slotted ALOHA
physical-layer models
telecommunication channels
telecommunication security
transmitted signal
transmitter Alice
unauthorized users
watchful adversary Willie
Willie's receiver
wireless system security
covert systems
achievable covert rates
channel capacity
channel coding
composability
Compositionality
Conferences
covert channels
covert communications
covert rate
access protocols
decision theory
Detectors
Measurement
medium-access control layer
Monitoring
packet collision channels
Physical layer
physical layer environment
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
biblio
Proposal of Equal-Weight (2, 2) Visual Secret Sharing Scheme on VN-CSK Illumination Light Communication
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
Scalability
Modified Pseudo-Orthogonal M-sequence
occurence probability
optical transmitters
orthogonal codes
probability
pubcrawl
Receivers
Resiliency
Metrics
secret data
telecommunication security
variable N-parallel code-shift-keying system
Visual Light Communications Security
visual secret sharing scheme
VN-CSK illumination light communication
VN-CSK system
adjacent illumination light interference
m-sequences
lighting function
lighting
light signal
light emitting diodes
indoor visible light communication channel
illumination light overlapping area
free-space optical communication
error statistics
Distributed databases
dimming control problem
data communication
Cryptography
constant illuminance
bit error rate performance
biblio
An application of Li-Fi based Wireless Communication System using Visible Light Communication
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
Arduino Uno
Fluctuations
light emitting diodes
Light emitting diodes (LEDs)
light fidelity
Light Fidelity or Li-Fi system
Metrics
Prototypes
pubcrawl
Receivers
Resiliency
Scalability
Visual Light Communications Security
VLC
Wireless communication
Wireless fidelity
biblio
A Fully Adaptive Lattice-based Notch Filter for Mitigation of Interference in GPS
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
intentional interference
Signal to noise ratio
Scalability
Satellites
Resiliency
resilience
Receivers
pubcrawl
notch frequency
notch filters
notch filter structures
narrowband interference
Lattice-Based Notch Filter
Jamming
Interference
adaptive filters
Human behavior
GPS specific applications
GPS receivers
GPS modelling platform
Global Positioning System
Global Navigation Satellite Systems
fully adaptive lattice-based notch filter
direct form second order
Deterrence
Bandwidth
Anti-jamming
adaptive notch filtering
Adaptive Notch Filter
biblio
Multi-beam Physical Security Scheme: Security Assessment and Impact of Array Impairments on Security and Quality of Service
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
radio transmitters
multilevel constellation
multiple-input multiple-output
perfect channel state information
Phase shift keying
power amplification
pubcrawl
quality of service
quasiconstant envelope signals
multibeam physical security scheme
Receivers
security assessment
signal components
Springs
telecommunication security
transmitting antennas
wireless channels
cyber physical systems
antenna arrays
array impairments
array power gain increments
array signal processing
channel level
component signal
Compositionality
CSI
amplification branch
decomposition
envelope variations
fact constrains
high order constellation signals
Metrics
MIMO communication
mMIMO
biblio
Quantum Low Probability of Intercept
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
Metropolitan area networks
telecommunication security
Resiliency
resilience
Receivers
quantum low probability of intercept
pubcrawl
probability
Photonics
optical fibre networks
optical fiber
OCIS codes
Monitoring
metropolitan-area distances
(060.1660) Coherent communications
Metrics
forward error correction
error probability
eavesdropping
eavesdropper
decryption key
Cryptography
composability
Ciphertext
Brightness
(270.5568) Quantum cryptography
(270.5565) Quantum communications
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »