Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
trust model
Trust Management.
TCP SYN flooding attacks
security of data
security mechanisms
security
Resiliency
resilience
Receivers
pubcrawl
packet dropping attacks
Anomaly Detection
intrusion detection system
Intrusion Detection
Fuzzy logic
distributed denial of service attacks
distributed denial of service
denial-of-service attack
denial of service
counter-security issues
computer resources
Computer crime
biblio
A filter selection based physical layer security system
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
filter design
signal processing security
USRP
software radio
RRC
root raised cosine filters
Roll of factor
radio networks
physical layer security system
physical layer security method
physical layer security
Physical layer
filtering theory
filter selection
network security
EVM
eavesdropping attacks
eavesdropper
Signal to noise ratio
Metrics
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
telecommunication security
Receivers
Conferences
biblio
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
Receivers
key size
Lagrange Polynomial
Linear Secret Sharing
private key cryptography
Productivity
Puncturable Attribute Based Encryption schemes
Puncturable Attribute-Based Encryption
punctured keys
key distributor
secret keys
secure data delivery
telecommunication security
Human behavior
pubcrawl
collaboration
policy-based governance
Scalability
key distribution center
IoT devices
Internet-of-Things
Internet of Things
forward encryption
fine grained access control
decryption
cybercriminals
Conferences
attribute-based key
attribute based encryption
attribute-based encryption
Access Control
encryption
authorisation
biblio
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
road safety
private information
Protocols
pseudonym-varying scheduling
pubcrawl
real-time systems
Receivers
resilience
Resiliency
privacy properties
Scalability
secure authentication algorithm
Security Properties
spatial-temporal messages
Spatial-Temporal Trust mechanism
Symmetric-Key Cryptography
Trusted Computing
anonymous messaging
privacy
message authentication
malicious cars
Intelligent Transportation Systems
Intelligent Transportation System
FastTrust
Fast and Anonymous Spatial-Temporal Trust
Expressways
entropy-based commitment
data privacy
Cryptography
connected cars
automobiles
authorisation
authentication
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
On the need for coordinated access control for vehicular visible light communication
Submitted by grigby1 on Mon, 01/21/2019 - 12:21pm
huge unlicensed spectrum
Visible Light Communications Security
Vehicular VLC
vehicular visible light communication
vehicular communications
V-VLC
Roads
Packet loss
negligible interference
Luxembourg mobility model
LOS requirement
interference-induced packet loss
IEEE 802.15 Standard
pubcrawl
high throughput applications
dedicated medium access control
coordinated access control
collision domain
access protocols
Access Control
Receivers
optical communication
Interference
Scalability
Resiliency
Metrics
biblio
Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System
Submitted by grigby1 on Mon, 01/21/2019 - 12:20pm
eavesdropping
Visible Light Communications Security
visible light communication system
signal to noise ratio threshold
Receivers
receiver aperture
optical wireless interception vulnerability analysis
optical links
modulation
lighting
indoor communication performance
indoor communication
security
Data Transmission
data communication
Apertures
optical communication
light emitting diodes
Signal to noise ratio
telecommunication security
Scalability
Resiliency
Metrics
pubcrawl
biblio
High Security Orthogonal Factorized Channel Scrambling Scheme with Location Information Embedded for MIMO-Based VLC System
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Scalability
OFCS-LIE
OFCS-LIE scheme
optical transmitters
orthogonal error
physical layer security
pubcrawl
Receivers
Reliability
resilience
Resiliency
resultant OFCS-LIE matrix
multiple-output channels
secrecy capacity
security
system security
system security analysis
telecommunication security
visible light beam
Visible Light Communications Security
visible light communication system confidentiality
visible light communication system privacy
wireless channels
Iterative methods
channel capacity
counterpart scrambling scheme
Cryptography
eavesdropper
free-space optical communication
high security orthogonal factorized channel scrambling scheme
Information Leakage
information transmission reliability
information transmission security
iteration number
Adaptive optics
iterative orthogonal factorization method
LIE matrix factorization
light emitting diodes
location information embedded matrix
Matrix decomposition
Metrics
MIMO-based VLC system
MIMO channels
MIMO communication
multiple-input
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »