Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data communication
biblio
Development Of A Novel Security Scheme Using DNA Biocryptography For Smart Meter Data Communication
Submitted by grigby1 on Tue, 01/07/2020 - 10:52am
electroencephalography
smart meters
smart meter data communication
smart meter communication
Simulink/Matlab
secure communication
Resiliency
resilience
pubcrawl
privacy
Predictive Metrics
Metrics
lightweight encryption scheme
Human behavior
Handheld computers
encryption
2-phase DNA cryptography
DNA cryptography
DNA
Diffie Hellman scheme
DH-EAB key exchange scheme
Data Security
data privacy
data communication
Cryptography
Communications technology
biology computing
Biocryptography
AMI security
AMI communication network
advanced security mechanisms
advanced metering infrastructure
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
local networks
transmission protocol
Symmetric Key Cryptography
secure data transmission
Resiliency
public key cryptography
pubcrawl
Protocols
node-to-node secure data transmission protocol
Node to node data transmission
Metrics
message authentication
low-power IoT devices
low-power devices
authentication
Kerberos
IoT devices exchange data
IoT
Internet of Things
internet
Human behavior
encryption
decryption
data communication
Cryptographic Protocols
computer network security
authorisation
biblio
Research Issues Based on Comparative Work Related to Data Security and Privacy Preservation in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 3:16pm
NIST
smart power grids
smart meters
Smart Grids
smart grid data communication
Smart Grid
secure data communication
pubcrawl
privacy preservation
privacy
power system security
power engineering computing
Smart Grid Privacy
Metrics
Human behavior
electric grids
Data Security
data privacy
data communication
cyber-threat
customer-safety
Cryptography
composability
authorisation
biblio
Air-Gap Data Transmission Using Screen Brightness Modulation
Submitted by grigby1 on Thu, 01/31/2019 - 12:12pm
Demodulation
unidirectional transmission
screen brightness modulation
Resiliency
resilience
pubcrawl
Monitoring
modulation
Metrics
Image Processing
Human behavior
frequency shift keying
error statistics
Digital demodulation
Air gaps
data communication channel
data communication
computer viruses
computer virus
composability
Cameras
Brightness
BFSK digital modulation
BFSK
Band-pass filters
Air-gap transmission
air-gap data transmission
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System
Submitted by grigby1 on Mon, 01/21/2019 - 12:20pm
eavesdropping
Visible Light Communications Security
visible light communication system
signal to noise ratio threshold
Receivers
receiver aperture
optical wireless interception vulnerability analysis
optical links
modulation
lighting
indoor communication performance
indoor communication
security
Data Transmission
data communication
Apertures
optical communication
light emitting diodes
Signal to noise ratio
telecommunication security
Scalability
Resiliency
Metrics
pubcrawl
biblio
System architecture for deep packet inspection in high-speed networks
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
PeerDirect
graphics processing units
Hardware
hardware tools
hardware-software solution
high-speed networks
Inspection
Mellanox
Napatech
Nvidia
graphics processing unit
pubcrawl
real-time data analysis
resilience
Resiliency
Scalability
software requirements
system architecture
Zero-copy
data communication
Central Processing Unit
computer architecture
computer network
computer network security
computing devices
CPU
CUDA
data analysis
bit rate 80.0 Gbit/s
data transmission networks
data volume real-time processing
deep packet inspection
DMA
DPDK
dpi
firewall
GPUDirect
biblio
The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijack
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
NDN
transport protocols
Topology
telecommunication network routing
Scalability
Routing protocols
Routing Information Base
Routing
Resiliency
resilience
pubcrawl
network topology
network routing
network architecture design
computer network
named data networking
Named Data Network Security
IPv4
IP router
IP networks
IP
Internet Protocol version 4
internet
Human behavior
hijacked node
forwarding plane
data communication
computer network security
biblio
Evaluation and analysis of network coding at network layer
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
network topologies
XOR technique
wireless networks
Throughput
telecommunication network topology
Resiliency
resilience
real time performance metrics
pubcrawl
packet radio networks
packet delivery rate
composability
network layer
network coding
Metrics
end-to-end delay
encoding
delays
delay
Decoding
data communication
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »