Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
An intelligent system for user behavior detection in Internet Banking
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
security
Internet-based development
loyal customers
Online banking
online banking systems
prosperity
pubcrawl170109
receiver operating characteristic curve
Receivers
Internet fraud
security of data
security threat
sensitivity analysis
suspicious behaviors
Suspicious Financial Transactions
user abnormal behavior
user behavior detection
virtual societies
financial crime
Banking
banking profitability
behavioural sciences computing
Credit cards
customer satisfaction
Cyber Attacks
e-banking services security
expert systems
Anti-money Laundering
fraud
fuzzy expert system
fuzzy systems
fuzzy theory
intelligent system
Intelligent systems
internet
Internet banking
biblio
"Time of flight measurements for optically illuminated underwater targets using Compressive Sampling and Sparse reconstruction"
Submitted by grigby1 on Tue, 02/21/2017 - 12:41pm
matched filters
turbidity
turbid underwater environment
sparse reconstruction theory
Sparse Reconstruction
Signal resolution
signal reconstruction
sensors
Receivers
radar resolution
pubcrawl170104
optically illuminated underwater target
optical radar
Nyquist sampling theorem
mixing signal processing method
Bandwidth
matched filter signal processing method
marine radar
linearly frequency modulated continuous wave hybrid radar system
linearly frequency modulated continuous wave hybrid lidar system
Laser radar
high resolution time of flight measurement
Frequency modulation
Frequency Chirp
FMCW Lidar
down-conversion signal processing method
compressive sensing theory
compressive sampling
compressed sensing
Chirp
biblio
"VLSI implementation of BER measurement for wireless communication system"
Submitted by grigby1 on Tue, 02/14/2017 - 12:50pm
forward error correction
wireless communication system
Wireless communication
VLSI implementation
VLSI
Very large scale integration
telecommunication control
symmetric encryption algorithm
Receivers
radio transmitters
radio receivers
pubcrawl170102
MIMO transmitter
MIMO receiver
MIMO communication
forward error correction codes
BER
FEC codes
fading channels
fading channel
error statistics
encryption
Data Transmission
Data Security
data reliability
CSEEC
cryptosystem with embedded error control
Cryptography
Crypto-System
Bit error rate
BER measurement communication system
biblio
"HRJ_encryption: An ASCII code based encryption algorithm and its implementation"
Submitted by grigby1 on Tue, 02/14/2017 - 12:10pm
information technology
Secret key
Receivers
public key cryptography
Public key
pubcrawl170102
private key cryptography
private key
Plain Text
personal desktop
Algorithm design and analysis
HRJ_encryption
encryption
decryption
Cloud Computing
cipher text
ASCII code based encryption algorithm
ASCII Code
arrays
biblio
"A MIMO Precoding Based Physical Layer Security Technique for Key Exchange Encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 2:16pm
precoding
Wireless communication
wireless channels
Transmitters
telecommunication security
security
secret key exchange encryption
Receivers
pubcrawl170102
private key cryptography
precoding matrix index
channel coding
OFDM modulation
OFDM
multiinput multioutput orthogonal frequency division multiplexing system
MIMO-OFDM channel precoding based physical layer security technique
MIMO communication
MIMO
matrix algebra
key error rate
KER
Indexes
biblio
Managing shared contexts in distributed multi-player game systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:17pm
Protocols
war games
SINS
Silicon compounds
shared context mapping
Semantics
security of data
secure infrastructure for networked systems
reliable middleware framework
Receivers
real-time systems
anonymous publish-subscribe
network losses-delay
multiplayer maze game
middleware
message passing
Lamport Paxos protocol
Irrigation
distributed transactional key-value store
distributed multiplayer game systems
delays
computer games
biblio
Enhancing security in cyber-physical systems through cryptographic and steganographic techniques
Submitted by BrandonB on Wed, 05/06/2015 - 2:08pm
information technology
Steganography
steganographic technique
security enhancement
Receivers
Public key
Pragmatics
physical elements
multi-agent systems
authorisation
hierarchical access
encryption
Data Security
data confidentiality
cyber-physical systems
Cryptography
cryptographic technique
computational elements
biblio
Group signature entanglement in e-voting system
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
group signature entanglement
security system
security of data
replay attack
Receivers
Qubit
Quantum entanglement
quantum computing
Protocols
politics
man-in-the-middle attack
authentication
Entanglement
entangled state
electronic voting
eavesdropping
e-voting system
digital signatures
database
cheating purposes
ballots
biblio
On the security of a certificateless signcryption scheme
Submitted by BrandonB on Wed, 05/06/2015 - 11:02am
encryption
Security analysis
Receivers
public key encryption
public key cryptography
Public key
key replacement attack
IND-CCA2 security
group theory
Games
certificateless signcryption scheme
discrete logarithm problem
Digital Signcryption
digital signatures
digital signature
Diffie-Hellman problem
Cryptography
cryptographic primitive
concrete attack approach
Computers
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »