Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication channel
biblio
Ultimate Secrecy in Cooperative and Multi-hop Wireless Communications
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
attenuation
ultimate secrecy ranges
short-range wireless communication systems
point-to-point channel
multihop channel measurements
indoor communication systems
in-device communication systems
frequency 550.0 GHz to 565.0 GHz
cooperative wireless communications
chip-to-chip communications
millimetre wave communication
Information Reuse and Security
frequency reuse
communication secrecy
Receivers
communication channel
radio transmitters
communication security
wireless channels
Compositionality
cooperative communication
Relays
Bandwidth
channel capacity
pubcrawl
Resiliency
security
telecommunication security
biblio
Crypto trust point (cTp) for secure data sharing among intelligent vehicles
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
IVs communication environment
crypto trust point
CTP
illegitimate vehicles behavior
information communication
Intelligent vehicle technology
Intelligent vehicles
intelligent vehicles communication
IV communication
IV data security
communication channel
legitimate vehicles behavior
rewarding thereby building trust
successful communication
Traditional Security approaches
Trust point mechanism
Vehicle communication
Intelligent Data Security
Intelligent Data and Security
trust
Scalability
Cryptography
telecommunication security
security
Resiliency
pubcrawl
vehicular ad hoc networks
blockchain
traffic engineering computing
Distributed databases
Reliability
security vulnerabilities
Compositionality
data accuracy
secure data
Insurance
communication data
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
information and communication devices
electromagnetic changes
electromagnetic interference
Electromagnetic scattering
electromagnetic waves
electronic devices
hardware trojan
high-power electromagnetic environments
IEMI
Immunity testing
electrical signal
integrated circuit reliability
intentional electromagnetic interference
local immunity
locally weakened immunity
low-tolerance IC
low-tolerance integrated circuits
serial communication systems
command injection attacks
Metrics
pubcrawl
resilience
Resiliency
Hardware
telecommunication security
integrated circuits
composability
telecommunication channels
security of data
Electromagnetics
Fault injection
attack targets
communication channel
Communication channels
data injection attack
device availability reduction
device immunity
biblio
Extended TLS Security and Defensive Algorithm in OpenFlow SDN
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
pubcrawl
Transport Layer Security
telecommunication channels
SSL/TLS
SSL Trust Models
software defined networking
Software Defined Network (SDN)
Software Defined Network
Servers
security
SDN security attacks
SDN OpenFlow communication
SDN controller
Scalability
Resiliency
resilience
SDN security
Protocols
OpenFlow SDN
OpenFlow
network topology
Network interfaces
network interface
Metrics
Human Factors
Human behavior
computer network security
computer network reliability
communication channel
certification
authentication
biblio
Packet Length Covert Channel: A Detection Scheme
Submitted by grigby1 on Thu, 09/05/2019 - 11:24am
Scalability
packet length covert channel
packet radio networks
packet size covert channel
Prevention
Protocols
Receivers
Reliability
resilience
normal terrific
security
security attack
system security policies
telecommunication channels
telecommunication security
telecommunication traffic
undetectable network covert channels
elimination
Communication channels
Compositionality
content development
content-based features
covert channel
covert channels
covert traffic
detection
communication channel
feature extraction
frequency-based features
illegal information flow
learning (artificial intelligence)
machine learning
machine learning based detection scheme
network protocols
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
biblio
"Secured data communication system using RSA with mersenne primes and Steganography"
Submitted by grigby1 on Tue, 02/14/2017 - 12:59pm
image file
Steganography
secured data communication system
RSA cipher
public key cryptography
Public key
pubcrawl170102
Prime RSA
Mersenne primes
Mersenne
arrays
Image color analysis
Image coding
hidden text
factorization
encryption
data communication
Cryptography
communication channel
Ciphers
biblio
Impacts of unreliable communication and regret matching based anti-jamming approach in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 7:49am
Jamming
wireless channels
unreliable wireless communication
smart power grids
Smart Grids
Smart Grid
regret matching
power system management
jamming attack
Algorithm design and analysis
Games
Educational institutions
DRM
demand response management
communication channel
cognitive radio
antijamming attack approach