Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 6:29pm
composability
Wireless communication
security
secure group communication
resilience
Receivers
Protocols
performance evaluation
Optimized production technology
mobile ad-hoc networks
key management
authentication
Ad hoc networks
Ad Hoc Network Security
Access Control
Human behavior
Metrics
Resiliency
Scalability
pubcrawl
biblio
Coverless Steganography Method based on the Source XML File Organization of OOXML Documents
Submitted by grigby1 on Thu, 10/20/2022 - 4:01pm
Organizations
pubcrawl
Metrics
Heuristic algorithms
privacy
composability
real-time systems
Receivers
Resistance
organization
Steganography
XML
compound tree
OOXML documents
search-based coverless steganography algorithms
steganography detection
biblio
A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels
Submitted by aekwall on Sun, 10/16/2022 - 6:03pm
Interference
game theoretic security
wireless communication network
security game
Pricing
channel capacity
Bayesian equilibrium
cooperative jamming
eavesdropping
Human Factors
Predictive Metrics
Probabilistic logic
Receivers
Scalability
pubcrawl
Wireless communication
Games
biblio
Improving Data Hiding Methods in Network Steganography Based on Packet Header Manipulation
Submitted by grigby1 on Thu, 10/06/2022 - 3:21pm
information science
Packet header manipulation
network steganography
covert channels
Resiliency
network protocols
Communications technology
Communication channels
Steganography
pubcrawl
Named Data Network Security
resilience
Receivers
Protocols
internet
Scalability
Human Factors
Human behavior
biblio
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Submitted by aekwall on Fri, 08/12/2022 - 3:54pm
privacy
Bandwidth
Protocols
Scalability
Receivers
Computational efficiency
blockchain
blockchains
pubcrawl
bitcoin
mixing
payment-channel-hubs
payment-channels
composability
biblio
Compressive Sampling on RFSoC for Distributed Wideband RF Spectrum Measurements
Submitted by grigby1 on Fri, 08/12/2022 - 9:58am
pubcrawl
resilience
Resiliency
Radio frequency
Prototypes
composability
Receivers
Time-frequency Analysis
quadrature amplitude modulation
microcomputers
compressive sampling
distributed measurements
Matching pursuit algorithms
RF spectrum
RFSoC
wideband signal
biblio
A Robust and Efficient Numeric Approach for Relational Database Watermarking
Submitted by grigby1 on Fri, 07/15/2022 - 12:45pm
Receivers
Open Access Database
Data owner protection
Copywrite Protection
open access
relational database security
distortion
Watermarking
Robustness
relational databases
Metrics
Decision Making
composability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Method for Increasing the Accuracy of the Synchronization of Generation Random Sequences Using Control and Correction Stations
Submitted by grigby1 on Thu, 07/14/2022 - 6:14pm
Receivers
satellite navigation system
Quantum random number generator
operational control segment
cryptographic standards
correcting stations
control information
Post-quantum cryptography
random key generation
Synchronization
Software algorithms
pubcrawl
Metrics
control systems
Cryptography
Scalability
Generators
Software
Resiliency
resilience
Human behavior
biblio
Design and Implementation of a Secure QR Payment System Based on Visual Cryptography
Submitted by aekwall on Thu, 07/14/2022 - 4:16pm
Logic gates
Cryptography
visualization
Servers
pubcrawl
Resiliency
Receivers
Mobile Applications
cyber-physical systems
information management
visual cryptography
online payment systems
QR codes
biblio
Combined Interference and Communications strategy evaluation as a defense mechanism in typical Cognitive Radio Military Networks
Submitted by grigby1 on Fri, 07/01/2022 - 10:22am
pubcrawl
resilience
Safety
military communication
Receivers
wireless networks
physical layer security
Interference
cognitive radio
Cognitive Radio Security
Resiliency
Channel models
military networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »