Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Interference
biblio
Secure Communication Protocol for Network-on-Chip with Authenticated Encryption and Recovery Mechanism
Submitted by grigby1 on Fri, 01/06/2023 - 4:33pm
network-on-chip
System recovery
SystemC TLM
Recovery Mechanism
Systems architecture
MPSoC
Interference
Scalability
simulation
encryption
Program processors
Protocols
authentication
Resiliency
resilience
pubcrawl
security
biblio
Physical Layer Security for Visible Light Communication in the Presence of ISI and NLoS
Submitted by grigby1 on Tue, 12/20/2022 - 2:35pm
physical layer security
Visible Light Communications Security
Symbols
reflection
physical layer se-curity
inter symbol interference
beamforming
artificial noise
MISO communication
visible light communication
pubcrawl
Interference
Transmitters
Wireless communication
Scalability
Conferences
Resiliency
resilience
Metrics
biblio
Analysis of Low Power Wireless Technologies used in the Internet of Things (IoT)
Submitted by grigby1 on Tue, 12/06/2022 - 2:49pm
Logic gates
Zigbee
Wireless communication
Sigfox
Resistance
quality of service
NB-IOT
LPWAN
lora
6LoWPAN
IoT
Internet of Things
Interference
pubcrawl
composability
resilience
Resiliency
biblio
Enhancing Physical Layer Security with Coordinated Multi-Point Transmission in 5G and Beyond Networks
Submitted by aekwall on Sun, 10/16/2022 - 6:12pm
security
5G mobile communication
5G
pubcrawl
Metrics
Resiliency
composability
Signal to noise ratio
physical layer security
Interference
transmitting antennas
antenna arrays
Coordinated Multi-Point
mMIMO
biblio
A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels
Submitted by aekwall on Sun, 10/16/2022 - 6:03pm
Interference
game theoretic security
wireless communication network
security game
Pricing
channel capacity
Bayesian equilibrium
cooperative jamming
eavesdropping
Human Factors
Predictive Metrics
Probabilistic logic
Receivers
Scalability
pubcrawl
Wireless communication
Games
biblio
FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Mon, 10/03/2022 - 12:48pm
wireless networks
time slot assignment
relay selection
Backtracking
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
underwater acoustic sensor networks
Interference
simulation
pubcrawl
Compositionality
Routing
composability
privacy
Safety
Resiliency
resilience
Metrics
Human behavior
biblio
Performance Analysis of Open-Source Hypervisors for Automotive Systems
Submitted by grigby1 on Thu, 09/29/2022 - 4:44pm
pubcrawl
Hardware
Scalability
Jitter
real-time systems
Linux
Virtual machine monitors
Instruction sets
Interference
i-o systems security
Performance
real-time
automotive
ARM virtualization
Benchmarking
biblio
vProfile: Voltage-Based Anomaly Detection in Controller Area Networks
Submitted by aekwall on Fri, 08/26/2022 - 11:56am
automotive
side-channel
Controller area network (CAN)
Production
Electric potential
Interference
Fingerprint recognition
cyber-physical systems
controller area network security
security
Internet of Things
Resiliency
pubcrawl
Wireless communication
Anomaly Detection
Intrusion Detection
authentication
biblio
Spatial-Resampling Wideband Compressive Beamforming
Submitted by grigby1 on Fri, 08/12/2022 - 9:58am
pubcrawl
resilience
Resiliency
composability
Robustness
Spatial resolution
Interference
Broadband communication
array signal processing
compressive sampling
Compressive beamforming
direction-of-arrival estimation
estimation of the direction of arrival
Sonar applications
Spatial-Resampling
wideband models
biblio
Malicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET
Submitted by grigby1 on Wed, 08/10/2022 - 2:42pm
vehicular ad hoc networks
Trust Routing
Secret key
NOMA
Node trust
group re-cipher key
group public key
information trust
hash chain
Interference
security
Clustering algorithms
Prediction algorithms
composability
digital signature
Scalability
Conferences
Resiliency
resilience
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »