Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio networks
biblio
Using Perfect Codes in Relay Aided Networks: A Security Analysis
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
Reliability
passive eavesdropping attacks
perfect codes
PHY-layer security approaches
physical layer operations
proper security mechanism
pubcrawl
radio networks
Receivers
relay aided networks
Relays
nonnegotiable concept
reliable intermediate relays
resilience
Resiliency
security
Security analysis
selected FEC scheme
simulations
system operations
wireless channels
distinct requirements
composability
cooperative communication
CPS
CPS modeling
CPS Security
Cryptography
cyber-physical systems
Decoding
decoding frame error rate
communication environments
error injection
error probability
error statistics
FEC codes.
forward error correction
forward error correction schemes
Hamming codes
human lives
Metrics
biblio
Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
sparse architectures
radio networks
resilience
Resiliency
route poisoning
Routing
routing around connectivity holes
routing scheme
routing table management
Scalability
software malfunctioning
RACH
telecommunication network management
telecommunication network reliability
telecommunication network routing
telecommunication security
time series
time-series analytics
Wireless communication
wireless network
wireless nodes
wormhole attacks
failure analysis
Blackhole attack
blackhole attacks
Computational modeling
continuous analytical systems
data collection applications
Delay Optimization
delays
dense architectures
dense networks
dynamic information
back testing
historical systems
Internet of Things
IoT networks
IoT routing
Mathematical model
node failures
Path Recovery
Peer-to-peer computing
probability
pubcrawl
biblio
Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With the Named Data Architecture
Submitted by aekwall on Tue, 05/26/2020 - 11:11am
stand-alone node RSU
intelligent transport system (ITS)
intermittent connection lifetime
multihop wireless network
named data architecture
named data network (NDN)
named data networking approach
NDN architecture
network simulator
NS3 software packages
RA-NDN protocol
real-world data
SA-RSU
improved network connectivity
SUMO software packages
TCP/IP implementation
total dissemination time
traffic load
traffic simulator software
vehicle to roadside unit (V2R)
vehicular ad hoc network (VANET)
vehicular densities
vehicular NDN
vehicular transmission ranges
Named Data Network Security
internet
IP networks
Scalability
Servers
telecommunication traffic
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Routing protocols
Roads
vehicular ad hoc networks
computer network security
radio networks
VANET
data storage
computer network reliability
vehicular ad hoc network
vehicles
ad hoc communications
data dissemination
data dissemination protocol
data received ratio
distributed roadside unit
biblio
Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:09am
persistent jamming attack
internal hardware Trojans
jamming attack
low-power transceivers
ML classifiers
network-on-chip communications
NoC switches
nonscalable multihop data transmission paths
On chip interconnect
On chip security
on-chip data transfer
on-chip wireless medium
denial-of-service attacks
radio transceivers
radiofrequency interconnections
random burst error correction code
Switches
switching networks
WiNoC security
wired NoC architectures
wireless interconnection
Wireless NoC
wireless NoC architectures
network on chip security
system-on-chip
telecommunication security
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Wireless communication
Metrics
machine learning
telecommunication network routing
telecommunication computing
radio networks
Scalability
DoS
Hardware Security
error correction codes
radiofrequency interference
DoS attack
Jamming
denial-of-service attack
machine learning classifier
HT
network-on-chip
data transfer security threats
biblio
Research on Physical Layer Security of Cooperative Networks Based on Swipt
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
energy harvesting
time allocation parameter
system security outage probability
SWIPT
source node
simultaneous wireless information and power transfer
relay nodes
relay networks (telecommunication)
radiofrequency power transmission
radio signals
radio receivers
radio networks
physical layer security performance
information long-distance transmission
energy-constrained nodes service life
computer network security
eavesdropping users
destination nodes
cooperative networks
Cooperative Network
cooperative communication
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
probability
power engineering computing
computer network reliability
biblio
Fuzzy Logic for Reducing Data Loss during Cyber Intrusion in Smart Grid Wireless Network
Submitted by aekwall on Mon, 02/10/2020 - 12:05pm
data loss
Smart Grid Sensors
Wireless Communication Network (WCN)
WCN
Smart Sensor
smart grid wireless network
smart grid communication network
nearby nodes
Internet Protocol address
Internet Protocol (IP)
higher degree nodes
grid power flow
graph theory approach wireless communication network
fuzzy rules
fuzzy logic approach
extreme IP
security of data
cyber intrusion
cyber-attack
Compositionality
Human Factors
radio networks
power system security
power engineering computing
Smart Grid
Fuzzy logic
smart power grids
graph theory
pubcrawl
Resiliency
smart devices
IP networks
biblio
Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network
Submitted by grigby1 on Tue, 01/21/2020 - 12:10pm
Metrics
Zigbee
wireless networks
timeslot allocation method
timeslot allocation
secure join
resource management
resource limitation problem
Resiliency
resilience
radio networks
pubcrawl
policy-based governance
multiple node join mechanism
collaboration
Mesh networks
IPv6-based industrial wireless network
ipv6 security
IPv6
IP networks
internet
industrial wireless network
IEEE 802.15.4e network
IEEE 802.15 Standard
Cryptography
computer network security
composability
biblio
Linear Precoding Design for Cache-aided Full-duplex Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
linear beamforming zero-forcing
edge node
FD mode
full-duplex
full-duplex transmission
future generation wireless networks
half-duplex counterpart
inner approximation method
Interference cancellation
iterative optimization algorithms
least mean squares methods
edge caching
linear codes
linear precoding design
minimum mean square error designs
optimization problems
precoding
radiofrequency interference
self-interference
spectral efficiency
zero trust
wireless networks
Resiliency
pubcrawl
policy-based governance
Iterative methods
optimization
array signal processing
radio networks
Human Factors
wireless channels
network coding
Scalability
approximation theory
cache storage
cache-aided FD system
cache-aided full-duplex networks
concave programming
data hungry
delivery time
delivery time analysis
delivery time optimization
biblio
Securing Industrial Wireless Networks: Enhancing SDN with PhySec
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
industrial landscape
sensors
software defined networking
network management
physical layer security
additional overhead
cryptographic procedures
cyber-physical production systems
cyber-security threats
industrial communication networks
network security
industrial wireless networks
interconnected devices
network security requirements
PhySec
secret key generation
transmission bandwidth
wireless solutions
actuator security
Communication system security
Cryptography
Internet of Things
Software
computer network management
Resiliency
Human behavior
pubcrawl
composability
computer network security
Wireless communication
Metrics
production engineering computing
software-defined networking
SDN
Communication networks
cyber security
radio networks
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
« first
‹ previous
1
2
3
4
5
6
next ›
last »