Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Throughput
biblio
Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:58am
mobile nodes
Throughput
threshold-based black hole attack prevention method
telecommunication security
security attack
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
mobile radio
AODV
mobile ad hoc networks
mobile ad hoc network
Metrics
manet privacy
MANET
malicious node
IP networks
fake routing information
data packets
Compositionality
Black hole attack
biblio
An Enhanced Approach for Attack Detection in VANETs Using Adaptive Neuro-Fuzzy System
Submitted by grigby1 on Thu, 10/29/2020 - 11:24am
Compositionality
MANET Attack Detection
vehicle-to-vehicle availability
temporary network
routing attacks
packet drop ratio
mobile ad hoc network
information dispersal approach
fuzzy neural nets
end to end delay
adaptive neuro-fuzzy system
mobile ad hoc networks
QoS
security
vehicular ad hoc networks
VANETs
Attack detection
telecommunication computing
Routing
Protocols
quality of service
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
local file system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
cloud computing system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
performance evaluation
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
Cloud Computing
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
biblio
An Algorithmic Approach to Highly Resilient SATCOM
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
optimisation
time-varying systems
Throughput
theoretic game
satellite communication
SATCOM networks
resource optimization
Resiliency
resilience
predictive analysis
optimization
Bandwidth
pubcrawl
military communication
Jamming
highly resilient SATCOM
generic SATCOM control loop
generic multivector structure
Games
game theory
Control Theory and Resiliency
biblio
Codes for Covert Communication over Additive White Gaussian Noise Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
encoding
Xenon
Throughput
Scalability
Resiliency
resilience
pulse position modulation
pubcrawl
Phase shift keying
multilevel coding
Monte Carlo methods
modified pulse-position modulation scheme
low-complexity error-control codes
error correction codes
additive white Gaussian noise channels
discrete memoryless channels
covert communication
covert channels
covert capacity
Compositionality
composability
coding scheme
channel coding
channel capacity
binary phase-shift keying
Binary phase shift keying
AWGN channels
Amplitude shift keying
biblio
High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
radio networks
link adaptation
low-density parity-check codes
modulation
modulation and coding schemes
modulation coding
multiple MCS rates
parity check codes
pubcrawl
Information hiding
resilience
Resiliency
Scalability
Throughput
underlying communication system
Wireless communication
wireless LAN
wireless local area network modulation
directional multi-Gigabit (DMG)
adaptive rate wireless communication systems
channel capacity
coding schemes
composability
Compositionality
covert channel performance
covert channel throughput
covert channels
adaptation mechanisms
embedding techniques
error statistics
forward error correction
forward error correction-based information hiding technique
generalized information hiding model
high-throughput covert channels
IEEE 802.11ad WLAN
biblio
Deep Packet Inspection in FPGAs via Approximate Nondeterministic Automata
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
high-speed computer networks
Throughput
telecommunication traffic
suspicious network traffic
Scalability
Resiliency
resilience
regular expression matching
RE matching
pubcrawl
network intrusion detection systems
multistage architecture
intrusion detection system
Internet connection
internet
Acceleration
Hardware
FPGA architecture
finite automata
field programmable gate arrays
deep packet inspection
computer network security
computer architecture
automata
architecture
approximate reduction techniques
approximate reduction
approximate nondeterministic FAs
approximate nondeterministic automata
biblio
Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
multiple encryption modes
energy limited internet of things applications
energy-adaptive lightweight hardware security module
high power consumption
high security levels
Internet of Things (IoT)
low power consumption
low power IoT applications
low security level
maximum dynamic power dissipation
Encryption Modes
partial dynamic reconfiguration
power 10.08 mW
power budget
power constraint
power-security level trade-off
security level values
security strength
Throughput
composability
Cryptography
encryption
Internet of Things
security
security attacks
Hardware
Data Security
pubcrawl
Ciphers
Metrics
Resiliency
cyber-physical systems
Applicability and Robustness (CAESAR)
Competition for Authenticated Encryption: Security
DPR system
dynamic partial reconfiguration
Dynamic Partial Reconfiguration (DPR)
biblio
Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
radiofrequency identification
wireless sensor networks
Throughput
telecommunication congestion control
tags collision
Tag matching
Tag group
Stability analysis
Smart tags
slot assignment algorithm
simulation
Resiliency
resilience
ALOHA algorithm
pubcrawl
object detection
Multitarget tags assignment slots algorithm
Multitarget RFID system
Multitag identification technique
Heuristic algorithms
Hash functions
Hash Function
hash algorithms
Compositionality
anti-collision algorithms
Anti-collision
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »