Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Indexes
biblio
Optimized Narrow-Band M2M Systems for Massive Cellular IoT Communications
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
Internet of Things
slotted-Aloha method
Resiliency
pubcrawl
Metrics
Markov processes
markov chain
machine-to-machine communications
machine-to-machine communication
M2M systems
LTE
Long Term Evolution
3GPP
Indexes
Human behavior
GSM
collaboration
clean-slate technologies
clean slate
cellular radio
cellular IOT communications
battery lifetime
Bandwidth
access protocols
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
biblio
High density impulsive Noise removal using decision based iterated conditional modes
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
PSNR
iterative noisy pixel estimation
low density impulse noise
mean square error
mean square error methods
MSE
noise detection process
Noise measurement
noise removal process
peak signal to noise ratio
Iterative methods
pubcrawl170111
Salt & Pepper Noise
salt and pepper noise
SSIM
Structure Similarity Index
structure similarity index measure
Switches
visual communication
Image quality
Cameras
Decision Based Algorithm
decision based iterated conditional modes
Decision Making
high density impulsive noise removal
ICM
image denoising
Image edge detection
camera sensor module impairment
Image resolution
image restoration
image sensors
image transmission
impulse noise
Indexes
iterated conditional modes
iterative decision based approach
biblio
Prioritization of MTTC-based combinatorial evaluation for hypothesized substations outages
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
power system reliability
Topology
Substations
substation ranking
substation protection
S-select-k problem
risk management
risk indices
Reliability
randomly generated mean-time-to-compromise value
pubcrawl170109
combinatorial mathematics
power generation reliability
MTTC-based combinatorial evaluation prioritization
mean time to compromise (MTTC)
Indexes
IEEE standards
IEEE 30-bus system
hypothesized substation outage
cyber-contingency analysis
Computer crime
Combinatorial verification
biblio
Risk-based DC security assessment for future DC-independent system operator
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk-based static security assessment methodology
Probabilistic logic
probability
pubcrawl170107
pubcrawl170108
randomness
Risk
risk assessment tools
risk-based DC security assessment
probabilistic approach
security
security assessment
uncertainty
Voltage control
wind power
wind power plants
wind speed variability
HVDC transmission
DC-independent system operator
DC-ISO
Fuzy
fuzzy inference system
fuzzy reasoning
fuzzy set theory
HVDC
HVDC power transmission
component risk
Indexes
Load flow
multiterminal HVDC
multiterminal HVDC system
offshore wind
power engineering computing
power system security
biblio
"Semantic-Based Searchable Encryption in Cloud: Issues and Challenges"
Submitted by grigby1 on Thu, 02/23/2017 - 12:43pm
Cloud Computing
Cryptography
data privacy
encryption
Indexes
pubcrawl170105
information security
information security technique
privacy-preserving issue
pubcrawl
searchable encryption
semantic search
semantic-based searchable encryption
Semantics
Servers
biblio
"A MIMO Precoding Based Physical Layer Security Technique for Key Exchange Encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 2:16pm
precoding
Wireless communication
wireless channels
Transmitters
telecommunication security
security
secret key exchange encryption
Receivers
pubcrawl170102
private key cryptography
precoding matrix index
channel coding
OFDM modulation
OFDM
multiinput multioutput orthogonal frequency division multiplexing system
MIMO-OFDM channel precoding based physical layer security technique
MIMO communication
MIMO
matrix algebra
key error rate
KER
Indexes
biblio
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
Indexes
bilinear pairings
CDH problem
Cloud Computing
computational Diffie-Hellman problem
Computational modeling
Cryptographic Protocols
data integrity
delegated verification
distributed computing
Distributed databases
formal system model
formal verification
ID-DPDP protocol
identity-based cryptography
identity-based distributed provable data possession
storage management
integrity checking protocol
multicloud servers
multicloud storage
outsourced data
private key cryptography
private verification
Protocols
provable data possession
public key cryptography
public verification
remote data integrity checking model
security
security model
Servers
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Scalable Packet Classification for Datacenter Networks
Submitted by BrandonB on Wed, 05/06/2015 - 11:58am
IP networks
VLANs
VLAN
virtual machines
telecommunication network routing
storage penalty
Software
Scalability
router architectures
packet forwarding
packet classification
Local area networks
length combinations
classification rules
Indexes
hash table
hardware parallelism
Hardware
firewalls
encoding
encoded rule expansion
Decision trees
datacenter networks
datacenter network
data structures
computer centres
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »