Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
Self-Healing Solutions for Wi-Fi Networks to Provide Seamless Handover
Submitted by grigby1 on Mon, 02/17/2020 - 5:12pm
quality of service
wireless LAN
wireless channels
wireless channel
Wi-Fi Networks
uniform seamless network quality of service
unexpected network faults
SON developments
self-organizing network paradigm
self-healing solutions
self-healing networks
seamless handover
Resiliency
resilience
Cellular networks
QoS
pubcrawl
Packet loss
mobility management (mobile radio)
ML algorithms
machine learning algorithms
learning (artificial intelligence)
IEEE 802.11 Standard
Handover
fault tolerant computing
fault diagnosis
composability
cellular radio
biblio
Artificial-Noise-Aided Robust Beamforming for MISOME Wiretap Channels with Security QoS
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
robust beamforming
formulated design problem
linear matrix inequalities
minimum allowable signal-to-interference
MISOME wiretap channels
multiantenna transmitter
multiple multiantenna eavesdroppers
power saving
radio receivers
RJOBF
estimation errors
robust joint optimal
secret signal
security communication
security QoS
security quality
single-antenna receiver
SINR
transmit power
array signal processing
Resiliency
pubcrawl
composability
Metrics
privacy
quality of service
physical-layer security
antenna arrays
telecommunication security
signal processing security
wireless channels
channel state information
concave programming
radio transmitters
artificial noise
artificial-noise-aided robust beamforming
convex programming
biblio
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
3G mobile communication
user authentication
unitary authentication model
telecommunication security
security levels
Scalability
resilience
quality of service
pubcrawl
multiservice system
multimedia interaction
mobility management (mobile radio)
mobile industry automation
late-model services
Internet of Vehicles
Identity management
identity authentication methods
3GPP committee
5G mobile communication
5G multiservice systems
5G network platform
composable three-factor authentication mechanism
Cryptographic Protocols
differentiated services
diversified identity authentication mechanism
diversified identity management
diversified security requirements
extensible authentication protocol
future fifth-generation mobile communications system
high definition visual communication
Human behavior
biblio
Edge Learning Based Green Content Distribution for Information-Centric Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
quality of service
intelligent path selection
internet
Internet of Things
learning (artificial intelligence)
network distribution
network quality
network traffic
pubcrawl
intelligent
real-time systems
resilience
Resiliency
revolutionary future networking architecture
Routing
Scalability
telecommunication traffic
content distribution
information-centric networking
information-centric internet of things
Information Centric Networks
Information Centric Network
IC-IoT requirements
IC-IoT
green content distribution scheme
green computing
encoding
edge learning
edge computing
distributed coding based content transmission
distributed coding
Decision trees
Decision Making
biblio
Modeling and evaluation of a new IoT security system for mitigating DoS attacks to the MQTT broker
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
low power devices
DoS attacks
generic IoT system
high interaction
high mobility
host Intrusion Detection System
human activities
human control
Internet of Things phenomenon
IoT security system
Denial of Service attacks
Message Queue Telemetry Transport protocol
MQTT
MQTT broker
queueing theory
security over IoT
structured activities
telemetry
actuator security
Human behavior
computer network security
IDS
Monitoring
Internet of Things
security
Protocols
transport protocols
Resiliency
IoT
pubcrawl
composability
Metrics
quality of service
Proposals
Floods
DoS
actuators
biblio
Enhanced Simulation Framework for Realisation of Mobility in 6LoWPAN Wireless Sensor Networks
Submitted by aekwall on Mon, 01/13/2020 - 12:04pm
6LoWPAN
shortest routes
personal area networks
mobility management (mobile radio)
Mobility
Handover
enhanced simulation framework
6LoWPAN wireless sensor networks
QoS
sensors
quality of service
security improvement
IoT
telecommunication network routing
simulation
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
performance evaluation
Internet of Things
computer network security
biblio
Balancing Security Guarantees vs QoS Provisioning in Combined Fog-to-Cloud Systems
Submitted by aekwall on Mon, 12/30/2019 - 12:16pm
efficient management solution
significant proportion
security of data
Scalability
resulting scenario
resource management
Resiliency
quality of service
QoS-Security trade-off
QoS provisioning
pubcrawl
Fog-to-Cloud
Fog Computing and Security
Fog computing
delivered QoS
decoupled transversal security strategy
DCF
Cryptography
computer architecture
combined fog-to-cloud systems
Cloud Computing
challenging aspects
balancing Security guarantees
authentication
architectural oriented policy handling
security
biblio
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
service request
preference learning
Processor scheduling
QoS provision
quality of service provision
scheduling
serious security risks
service brokers
service composition
multiagent platform JADE
three-layered trust-enabled service composition model
transaction success rate
trust-based agent learning model
user experience
user experiences
user preference learning
user satisfaction
Computing Theory and Trust
Trust management
Task Analysis
Trusted Computing
mobile computing
learning (artificial intelligence)
pubcrawl
composability
Computational modeling
multi-agent systems
Cloud Computing
fuzzy set theory
quality of service
mobile cloud computing
Compositionality
customers service preferences
fuzzy comprehensive evaluation method
mobile cloud computing environments
multi-agent technology
biblio
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
command injection attacks
Time factors
substation automation system
substation automation
stealthy injection attacks
security technologies
SaS
Queueing analysis
QoS requirements
Message service
IEC61850s GOOSE messaging service
generic object oriented substation events messaging service
communications channels
security of data
quality of service
power system security
power engineering computing
IEC standards
Substations
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
EUBra-BIGSEA, A Cloud-Centric Big Data Scientific Research Platform
Submitted by aekwall on Mon, 10/28/2019 - 10:39am
-Big-Data
Scientific Computing Security
QoS-aware layer
project EUBra-BIGSEA
Programming Models
multiple data models
multidimensional data
distributed Big Data applications
data analytics tools
cloud-computing
cloud-centric Big Data scientific research platform
cloud-based environment
-Quality-of-Service
-Data-Analytics
security
Biological system modeling
Compositionality
Predictive Metrics
quality of service
privacy
data analysis
pubcrawl
Resiliency
Data models
data privacy
Big Data
Cloud Computing
security of data
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »