Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Delay Optimal Coding for Secure Transmission over a Burst Erasure Wiretap Channel
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
Resiliency
Metrics
minimum possible delay
network coding
optimal secure burst erasure
perfect security
pubcrawl
Receivers
resilience
low-delay coding
Secure Messages
secure transmission
security
streaming code
Streaming communication
Systematics
telecommunication security
delay optimal burst erasure correcting
block codes
burst erasure correcting code
burst erasure wiretap channel
code parameters
composability
cyber physical systems
Decoding
delay constraint
channel coding
delay optimal coding
delay optimal streaming codes
delays
diagonal interleaving
DO-SBE block codes
error correction codes
information security
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
passive attacks
wiretap attacks
wiretap attack
wireless networks
wired networks
weak security
secure network coding system architecture
Routing
Resiliency
resilience
Receivers
random network coding system
random codes
pubcrawl
communication confidentiality
network performance metrics
network links
network coding
Metrics
Hash functions
encoding
eavesdropper
deterministic network coding system
cyber security
cyber physical systems
Cryptography
composability
biblio
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking
Submitted by grigby1 on Mon, 04/06/2020 - 2:22pm
Proposals
network node
O2CEMF
off-path cache exploration
off-path cached content
off-path cached copies
off-path caches
On-demand exploration
original content publisher
network coding
pubcrawl
reachability information
Receivers
resilience
Resiliency
Routing
telecommunication network routing
cache storage
NC-NDN
named data networking
multiple on-path routes
multipath forwarding strategy
multipath forwarding
Metrics
internet
in-network caching
in-network caches
cyber physical systems
content delivery performance
computer networks
computer network security
composability
Complexity theory
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
biblio
A Graph-Based Modular Coding Scheme Which Achieves Semantic Security
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
error-correcting code
universal hash functions
theoretical cryptography
telecommunication security
Semantics
semantic security
Receivers
Random variables
pubcrawl
modular wiretap codes
graph-based modular coding scheme
graph theory
Gaussian channels
coding theory
error correction codes
encoding
Eigenvalues and eigenfunctions
edge-disjoint biregular graphs
discrete Gaussian wiretap channel
Cryptography
Compositionality
composability
channel coding
BRI function
biregular irreducible functions
security
biblio
Communication Design for Underwater Acoustic Positioning Networks
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
multiple users UAPN
Underwater Networks
Underwater acoustics
underwater acoustic positioning networks
spread spectrum communication
sonar equation
Sonar
signal design
reliable communication
positioning service
offshore exploration
Oceans
ocean monitoring
networking protocols
narrow acoustic bandwidth
Scalability
marine research
marine engineering
communication design
underwater acoustic communication
telecommunication network reliability
Gold
sensors
Correlation
Metrics
component
Protocols
pubcrawl
Resiliency
Receivers
biblio
A System Design of Real-Time Narrowband Rfi Detection And Mitigation for Gnss-R Receiver
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
resilience
mitigation
NF
Passband
pubcrawl
radio detection
radio receivers
radiofrequency interference
real-time narrowband radiofrequency interference detection
real-time narrowband radiofrequency interference mitigation
real-time NB RFI detection
real-time NB RFI mitigation
Receivers
Metrics
Resiliency
RFI
satellite navigation
signal-to-noise ratio
SNR
system analysis and design
system design
threat mitigation
white narrowband interference
Wireless communication
WNBI
FPGA
band-stop filters
cascading IIR band-stop filters
cGNSS-R
continuous wave interference
conventional GNSS-R
CWI
DDM
delay-Doppler map
detection
field programmable gate arrays
fixed-point implementation
Band-pass filters
Global navigation satellite system
Global Navigation Satellite Systems-reflectometry
GNSS-R
Human behavior
Human Factors
iGNSS-R
IIR BSF
IIR filters
IIR notch filter
interference suppression
interferometric GNSS-R receivers
biblio
Regaining Insight and Control on SMGW-based Secure Communication in Smart Grids
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
proxy
TLS
telecommunication security
SMGW-based secure communication control
smart power grids
smart meters
smart meter gateways
smart meter gateway
Smart Grids
smart grid security
Smart Grid
security
Scalability
Resiliency
Receivers
pubcrawl
case-specific security settings
privacy
power system security
power engineering computing
policy language
performance evaluation
network servers
Metrics
Logic gates
internetworking
Internet of Things
Data protection
critical smart grid infrastructure
communication security control
communication security
communication protection
biblio
Edge Based Image Steganography: Problems and Solution
Submitted by grigby1 on Mon, 02/10/2020 - 11:43am
Image edge detection
steganography schemes
steganography detection
Steganography
secrete messages bits
secrete message
Receivers
pubcrawl
privacy
Payloads
Metrics
LSB
Indexes
Color
image colour analysis
Image color analysis
Image coding
embedding scheme
edges positions
edge based image steganography
edge
Detectors
data encapsulation
composability
color images
Color image
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »