Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quality of service
biblio
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
enhanced device identity
communication technologies
communication reliability
operational efficiency
hardware-software codesign
cyber physical systems
quality of services
Blockchain protocols
Byzantine actor
citizen welfare
distribution framework
Transmitters
entity trust
hardware-software codesign approach
IoT-CPS
multitier methodology
radio frequency-distinct native attributes
RF-DNA
RF-DNA Fingerprinting
system trustworthiness
trust-building
CPS Privacy
Wireless communication
computer network security
data privacy
Internet of Things
Cryptographic Protocols
Trusted Computing
Support vector machines
cyber-physical systems
Human behavior
pubcrawl
Communication system security
IoT
blockchain
internet
privacy
cryptocurrencies
quality of service
authentication
Human Factors
smart cities
Trust management
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
CPS infrastructure
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
cyber world
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
wireless sensor networks
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
computer network security
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
biblio
Context-Aware Privacy Preservation in a Hierarchical Fog Computing System
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
quality of service
Computing Theory and Privacy
multiple fog node communication
hierarchical infrastructure
hierarchical fog computing system
FOG computing environment
dynamic MDP-based privacy-preserving model
decentralized infrastructure
context-aware privacy preservation
content-aware applications
zero-sum game
Ethernet
Privacy Threats
Topology
security of data
Redundancy
network topology
pubcrawl
Human behavior
Resiliency
real-time systems
game theory
Protocols
distributed processing
Internet of Things
data privacy
Scalability
biblio
Experimenting with Real Application-specific QoS Guarantees in a Large-scale RINA Demonstrator
Submitted by aekwall on Tue, 09/08/2020 - 10:16am
perceived quality of experience
effective QoS support
end-user
ERASER disclose
experienced QoS metrics end-to-end
Fed4FIRE + medium experiment ERASER
HD video streaming demonstration
heterogeneous applications
large-scale experimentation
large-scale RINA demonstrator
network load conditions
diverse QoS requirements
QTA-Mux
quality of experience
RINA
synthetic application traffic
t network locations
video streaming sessions
video traffic
virtual wall experimentation facility
clean slate
policy governance
internetworking
telecommunication traffic
computer architecture
Resiliency
Human behavior
pubcrawl
Metrics
5G mobile communication
delays
quality of service
QoS
Servers
Streaming media
video streaming
Metropolitan area networks
telecommunication scheduling
37-node 5G metro RINA network scenario
37-node 5G regional RINA network scenario
accepted candidate scheduling policy
actual quality of service guarantees
application-specific QoS guarantees
clean-slate recursive internetwork architecture
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
Ciphers
Autonomic Security
security process
production equipment
product customisation
MQTT infrastructure
manufacturing enterprises
industry 4.0 environments
generic autonomic management framework
data transmission flexibility
customized production processes
anomaly detection methods
security of data
data communication
quality of service
Anomaly Detection
business process
production engineering computing
Industries
composability
pubcrawl
Resiliency
Servers
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
privacy protection algorithm
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
collaboration-based location privacy protection method
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
Switches
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
collaboration
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
biblio
A Secure Service Discovery Scheme for Mobile ad hoc Network using Artificial Deep Neural Network
Submitted by aekwall on Mon, 08/03/2020 - 10:17am
numerous security challenges
telecommunication security
telecommunication computing
software agents
service providers
service discovery process
service discovery operation
service discovery
security information
security
Routing protocols
quality of service
QoS
pubcrawl
manet privacy
neural nets
mobile ad hoc networks
mobile ad hoc network
MANET
improved security
cross-layer discovery
artificial deep neural network
agent-based cross-layer
agent based secure service discovery scheme
Ad Hoc Network Security
Compositionality
Metrics
Resiliency
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »