Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data communication
biblio
Security Enhancement for CO-OFDM/OQAM System using Twice Chaotic Encryption Scheme
Submitted by grigby1 on Thu, 06/30/2022 - 4:59pm
encryption
security
pubcrawl
resilience
Resiliency
Scalability
Next generation networking
chaotic communication
Metrics
simulation
data communication
chaotic cryptography
Asia
biblio
Analysis on the Application of Cryptographic Technology in the Communication Security of Intelligent Networked Vehicles
Submitted by grigby1 on Wed, 06/08/2022 - 1:54pm
Internet of Vehicles
security protection
security
Scalability
Resiliency
resilience
pubcrawl
password technology
Internet of Vehicles (IoV)
Security Policies Analysis
intelligent data
information security
data privacy
data communication
Cryptography
connected vehicles
Compositionality
automation
biblio
LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks
Submitted by grigby1 on Tue, 05/24/2022 - 1:49pm
Metrics
energy efficient
cluster-based protocol
Energy Efficiency
Wireless Sensor Network
LEACH
Base stations
data communication
energy consumption
Compositionality
pubcrawl
composability
Information Assurance
Topology
wireless sensor networks
Protocols
Resiliency
resilience
Human behavior
biblio
Mitigating unsecured data forwarding related attack of underwater sensor network
Submitted by grigby1 on Fri, 05/06/2022 - 4:25pm
malicious node
Unsecure data forwarding
UnetStack
Underwater Sensor Network
attacks and their mitigation approaches
location awareness
Underwater Networks
underwater communication
Tsunami
security
data communication
Scalability
Software algorithms
Metrics
wireless sensor networks
Resiliency
resilience
pubcrawl
biblio
Eliminating Broadband Covert Channels in DSA-Like Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 3:13pm
data hiding
subliminal channel
Steganography
Scalability
Resiliency
resilience
Redundancy
Public key
pubcrawl
DSA
digital signatures
data communication
covert channels
covert channel
control systems
Compositionality
composability
channel capacity
Broadband communication
biblio
A High Speed Montgomery Multiplier Used in Security Applications
Submitted by grigby1 on Tue, 04/19/2022 - 10:46am
Montgomery multiplier
Table lookup
signal processing security
signal processing
Reverse carry propagate adder
Resiliency
resilience
pubcrawl
privacy
exponentiation
Metrics
Filtering
delays
data communication
cryptosystem
Cryptography
composability
adders
biblio
DDOS prevention in IoT
Submitted by grigby1 on Wed, 04/13/2022 - 2:52pm
malware
DDoS Attack Prevention
DDoS prevention
mirai
denial-of-service attack
Technological innovation
data communication
IoT security
Metrics
Internet of Things
composability
Industries
batteries
network security
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Secure Channel Established by the PF-CL-AKA Protocol with Two-Way ID-based Authentication in Advance for the 5G-based Wireless Mobile Network
Submitted by aekwall on Fri, 02/25/2022 - 10:43am
Compositionality
provable security
two-way identity-based authentication in advance
provable secure in Lippold model
pairing-free certificateless authenticated key agreement (PF-CL-AKA) protocol
fully secure channel
5G-based wireless mobile network
Predictive Metrics
Communication system security
quality of service
Resiliency
pubcrawl
Wireless communication
Analytical models
Protocols
authentication
data communication
biblio
Research on Data Security Protection System Based on SM Algorithm
Submitted by aekwall on Fri, 02/04/2022 - 10:30am
Cryptography
Data models
Internet of Things
data communication
information technology
encryption
Distributed databases
pubcrawl
Metrics
Resiliency
Human behavior
composability
Data Security
information science
SM algorithm
Repudiation
biblio
A Time Interval Based Blockchain Model for Detection of Malicious Nodes in MANET Using Network Block Monitoring Node
Submitted by grigby1 on Tue, 09/21/2021 - 3:35pm
Block Analysis
Compositionality
Conferences
data communication
malicious node detection
MANET Attack Detection
Metrics
mobile ad hoc networks
Monitoring
Network Block Monitoring Node
pubcrawl
resilience
Resiliency
Routing
routing table
Time Interval Based Blockchain Model
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »