Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Synchronization
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
EMPTCP: An ECN Based Approach to Detect Shared Bottleneck in MPTCP
Submitted by grigby1 on Wed, 12/02/2020 - 2:03pm
Protocols
transport protocols
telecommunication congestion control
Synchronization
Switches
subflows
shared bottleneck detection scheme
Scalability
Resiliency
resilience
real-time systems
real time protocol
real time networks
pubcrawl
Bandwidth
network efficiency
multiple bottleneck scenario
Multimedia communication
MPTCP sender
lightweight yet accurate approach
enhanced MPTCP protocols
end-to-end delay
EMPTCP
ECN scheme
delays
coupled congestion control
computer networks
bottleneck link
biblio
Throughput Control Method Between Different TCP Variants Based on SP-MAC Over WLAN
Submitted by grigby1 on Wed, 12/02/2020 - 1:52pm
throughput guarantee control method
Synchronization
Synchronization phenomena of Coupled oscillator
synchronization phenomena of coupled oscillators
TCP variants
TCP versions
telecommunication congestion control
Throughput
throughput control method
synchronisation
total throughput
transport protocols
Wireless communication
wireless LAN
wireless local area networks
wireless terminals
WLAN
media access control method
access protocols
carrier sense multiple access
collision avoidance
Compound TCP
Compounds
coupled congestion control
CUBIC-TCP
media access control
access point
Media Access Protocol
Oscillators
pubcrawl
resilience
Resiliency
Scalability
SP-MAC
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
multi-threading
vulnerabilities
tools
Synchronization
security of data
security
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
multithreaded execution nondeterminism
Clocks
Metrics
Instruments
Instruction sets
cyber physical systems
CPS
CONVUL
Concurrent computing
concurrency vulnerability detection
concurrency control
Concurrency
composability
biblio
Cybersecure Distributed Voltage Control of AC Microgrids
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
secondary voltage control
power system security
Protocols
pubcrawl
Reactive power
reactive power control
resilience
resilience threshold
Resiliency
resilient control approach
resilient flocking
multi-robot systems
security of data
Synchronization
synchronization behavior
utilized control protocols
virtual time-varying communication graph
Voltage control
voltage restoration
weighted mean subsequence reduced algorithm
WMSR algorithm
distributed energy resources
communication links
Computing Theory
control engineering computing
cyber-attacks
cybersecure distributed voltage control
Cybersecurity
cyberthreats
Decentralized Control
DERs
distributed control
AC microgrids
distributed power generation
distributed secondary voltage control
frequency control
graph theory
malicious adversaries
microgrid test system
Microgrids
mobile robot team
mobile robots
biblio
Speech encryption based on the synchronization of fractional-order chaotic maps
Submitted by aekwall on Tue, 09/08/2020 - 10:13am
chaotic cryptography
speech encryption
speech communication
key generation mechanism
input speech signal
Fractional-order chaotic systems
fractional-order chaotic map
exact synchronization
encryption system
encryption function
encrypting decrypting speech
Deadbeat observer
chaotic key matrix
chaotic key generator
speech processing
Chaotic systems
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Ciphers
Correlation
Robustness
matrix algebra
Synchronization
synchronisation
composability
pubcrawl
Resiliency
encryption
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
Internet key exchange protocol
IPsec
4-dimension chaotic system
chaotic cryptosystem
chaotic cryptosystem solution
data phase transfer
FPGA implementation
IKE
IKE protocol
securing communications
keys phase exchange
man in the middle attack
network communication domain
network protocol
SA
security association attack
word length 128 bit
computer network security
IPSec protocol
chaotic cryptography
chaotic communication
Predictive Metrics
DH-HEMTs
internet
Cryptography
Synchronization
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
FPGA
field programmable gate arrays
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by aekwall on Tue, 09/08/2020 - 10:11am
chaotic communication
reconfigurable hardware
random number sequence
human body
Hopfield neural networks
Hopfield neural nets
encryption circuit
dynamic systems
chaotic synchronization
chaotic signal simulation
asymmetric cryptography method
reconfigurable architectures
chaotic cryptography
field programmable gate arrays
Predictive Metrics
Dynamical Systems
random number generation
Neural networks
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
Cryptography
FPGA
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
light emitting diodes
synchronization message
synchronization deviation
on-board communications
counter value
counter synchronization method
CAN
controller area networks
Security Evaluation
automobile security
replay attack
DoS attack
Automotive engineering
controller area network security
message authentication
Synchronization
synchronisation
pubcrawl
Resiliency
cyber-physical systems
Receivers
Internet of Things
Conferences
computer network security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »