Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
A New Key Exchange Algorithm over a VLC Indoor Channel
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Neural Synchronization
VLC indoor channel
VLC
Visible Light Communications Security
visible light communication indoor channel
tree parity machine synchronization
Synchronization
synchronisation
stimulus vector
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
neuronal synchronization
average synchronization time t_sync
Metrics
key exchange algorithm
indoor communication
hyperelliptic curves
GF(2n)
Galois fields
Galois field
free-space optical communication
Diffie-Hellman protocol
DH-HEMTs
cryptosystem security
Cryptography
Cryptographic Protocols
Biological neural networks
biblio
FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light Communications
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Retina
invisible data encoding
Metrics
Mobile handsets
mobile phone screens
novel modulation method
optical modulation
optical transmitters
pubcrawl
Receivers
resilience
Resiliency
Image color analysis
Scalability
Steganography
telecommunication security
time 2.0 d
uniform data
unlicensed bandwidth resources
unobtrusive steganography methods
user distraction
visible light communications
visual MIMO
display screencamera communication
BER
Bit error rate
camera based receiver architectures
Cameras
color shift based methods
data encapsulation
data hiding capability
Data Transmission
Demodulation
demodulation mechanisms
Device-to-device communication
Visible Light Communications Security
display transmitters
error correction codes
error statistics
foveation
foveation based data hiding
FoVLC
free-space optical communication
HAN systems
home area networking system
human visual system
biblio
A Low Power Cybersecurity Mechanism for WSNs in a Smart Grid Environment
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
smart grid environment
phasor measurement
Phasor measurement units
power consumption
power system security
pubcrawl
Receivers
resilience
Resiliency
security of data
sensor devices
smart grid cybersecurity
North American Electric Reliability Corporation
smart grid monitoring application
Smart Grid Sensors
Smart Grids
smart power grids
Substations
Throughput
wireless sensor networks
WSN cybersecurity mechanism
WSN security mechanisms
WSNs
Denial-of-Sleep Attack
CIP-002 standards
CIP-009 standards
communication functionalities
Compositionality
computer security
critical infrastructure protection standards
critical power grid infrastructure
Cybersecurity
cybersecurity requirements
delay
CIP
Distributed Sensing
Human behavior
Human Factors
low power consumption
low power cybersecurity mechanism
MAC layer
Monitoring
NERC
NERC CIP requirements
NERC CIP standards
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
biblio
Physical layer security using BCH and LDPC codes with adaptive granular HARQ
Submitted by grigby1 on Fri, 10/26/2018 - 4:51pm
reliable transmission
LDPC codes
legitimate channel
legitimate receiver
legitimate recipient request
parity check codes
physical layer security
pubcrawl
received symbols likelihood computations
Receivers
Reliability
intended receiver
Resiliency
retransmitted packets
Scalability
secure transmission
security
Signal to noise ratio
telecommunication security
transmission techniques
wireless communications systems
decoding process
additive noise Gaussian wiretap channel
Automatic repeat request
BCH codes
better channel conditions
channel capacity
channel codes
channel coding
coded packets
Conferences
Decoding
adaptive granular HARQ
eavesdropper
equal channel conditions
error correction codes
error statistics
feedback transmitted packets
forward error correction
granular subpackets
HARQ retransmission requests
hybrid automatic repeat-request protocol
biblio
A centralized inter-cell rank coordination mechanism for 5G systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:52am
MMSE receiver
conventional non interference-aware schemes
future fifth generation wireless system
game-theoretic interference pricing measure
intercell interference management mechanism
interference aware intercell rank coordination framework
interference pricing
interference resilience property
interference resilience trade-off
least mean squares methods
linear minimum mean squared error receivers
mean signal-to-interference-plus-noise ratio
centralized intercell rank coordination mechanism
MMSE receivers
multiple receive antennas
multiple transmit antennas
random matrix theory
rank adaptation
receiving antennas
space division multiplexing
spatial multiplexing
transmitter-receiver pair
transmitting antennas
antenna arrays
pubcrawl
matrix algebra
Interference
Receivers
radio receivers
radiofrequency interference
Signal to noise ratio
estimation
resilience
Throughput
Transmitters
game theory
5G mobile communication
MIMO
search problems
5G
Pricing
Monte Carlo methods
Monte Carlo simulations
Computing Theory
5G systems
brute-force exhaustive search algorithm
biblio
Novel IDS security against attacker routing misbehavior of packet dropping in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:32pm
Nodes
telecommunication security
telecommunication network routing
security
Secure Routing
routing. Security
Routing protocols
Routing
Resiliency
resilience
Receivers
pubcrawl
Packet dropping
Attack detection
mobile ad hoc networks
mobile ad hoc network
Metrics
Measurement
MANET
Malicious Attacker
intermediate nodes
IDS security system
IDS
Compositionality
attacker routing misbehavior
biblio
CCSP: A compressed certificate status protocol
Submitted by grigby1 on Thu, 06/07/2018 - 3:15pm
Online Certificate Status Protocol servers
Web servers
Web browser
timestamped certificates
SSL Trust Models
sophisticated cyber-attackers
signed certificates
Scalability
Resiliency
resilience
Receivers
public key cryptography
Public key
pubcrawl
Protocols
Browsers
OCSP-based methods
OCSP servers
Metrics
internet
Human behavior
Conferences
computer network security
compressed certificate status protocol
certification
Certificate Revocation Lists
certificate revocation checks
certificate authorities
CCSP
CAS
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
biblio
Physical layer security transmission in cognitive radio network composed of multi-downlinks SU network
Submitted by grigby1 on Thu, 06/07/2018 - 2:55pm
Signal to noise ratio
secrecy rate
multi-downlinks
Downlink
Cognitive Radio Network
channel selection
Resiliency
Metrics
resilience
pubcrawl
beamforming
array signal processing
Receivers
Physical layer
physical layer security
Interference
network security
composability
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
next ›
last »