Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
correlation methods
biblio
Highly Secured all Optical DIM Codes using AND Gate
Submitted by grigby1 on Tue, 02/23/2021 - 1:37pm
optical gating
highly secured all optical DIM codes
MAI reduction
multiple access interference
multiple access interference (MAI)
optical amplifiers
optical code division multiple access
Optical Code Division Multiple Access system (OCDMA)
optical communication equipment
optical diagonal identity matrices codes
Diagonal Identity Matrix (DIM)
optical logic
optical systems
regularly expanding information traffic
semiconductor optical amplifier
Semiconductor optical amplifiers
spectral amplitude coding-OCDMA systems
zero cross-correlation
Zero Cross-Correlation (ZCC)
network coding
security
pubcrawl
Metrics
resilience
Resiliency
composability
telecommunication traffic
Q-factor
Logic gates
Optical fibers
codes
Optical fiber networks
interference suppression
Integrated optics
AND Gate
code division multiple access
correlation methods
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 3:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
A Scalable Correlation Clustering strategy in Location Privacy for Wireless Sensor Networks against a Universal Adversary
Submitted by aekwall on Mon, 10/26/2020 - 11:02am
correlation methods
Location Privacy in Wireless Networks
wireless network sensors
universal adversary
scalable correlation clustering strategy
remote Environment
adversary
information privacy
telecommunication network planning
Compositionality
Semantics
energy consumption
scalable
telecommunication security
sensors
trust
Correlation
Metrics
sensor placement
privacy
location privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
security
biblio
Analysis of Key Randomness in Improved One-Time Pad Cryptography
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
random numbers
random key generation
true random number generator
shuffling algorithm
random keys
Psuedo Random Number Generator
perfect secrecy algorithm
Pearson correlation analysis
one-time pad cryptography
one-time pad
key randomness
key generation
Fisher-Yates shuffling algorithm
Fisher-Yates algorithm
Scalability
OTP
Ciphers
correlation methods
Mice
random number generation
Generators
Prediction algorithms
Metrics
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels
Submitted by grigby1 on Wed, 03/04/2020 - 3:15pm
telecommunication security
physical layer security
private key cryptography
pubcrawl
secret key generation studies
security
software radio
TDD
TDD mode
Pearson correlation coefficient
theoretical analysis
theoretical cryptography
time division duplexing
time division multiplexing
USRP
wireless channel reciprocity
wireless channels
X310 universal software radio peripheral
FDD
channel state information
composability
Compositionality
correlation methods
CSI correlation coefficient
eavesdropping attack
eavesdropping distance
eavesdropping wiretap channel model
channel reciprocity
FDD channel reciprocity
FDD wiretap channels
frequency division duplexing
frequency division multiplexing
indoor radio
indoor wireless CSI measurement system
legitimate channel
N210
biblio
Synthesis of Discrete Complex Nonlinear Signals with Necessary Properties of Correlation Functions
Submitted by aekwall on Mon, 02/17/2020 - 1:23pm
multiuser detection
correlation functions
cryptographic signal
discrete complex nonlinear signals
discrete sequence
distributed spectrum technology
finite field
ICS applications
interference (signal)
isomorphism
correlation function
multiuser systems
nonlinear discrete cryptographic signals
nonlinear discrete sequences
pseudorandom sequences
radio spectrum management
Random sequences
signal detecting
telecommunication systems
signal processing security
Resiliency
pubcrawl
composability
Cryptography
Metrics
Correlation
privacy
channel coding
integrated circuits
telecommunication security
correlation methods
information security
wireless channels
information and communication systems
Broadband communication
radiofrequency interference
autocorrelation properties
channels code division
biblio
Efficient Video Encryption Using Lightweight Cryptography Algorithm
Submitted by grigby1 on Tue, 01/07/2020 - 9:54am
Resiliency
lightweight cryptography algorithm
lightweight encryption methods
low computation cost
low powered battery operated devices
natural redundancy
neighbouring pixels
pubcrawl
resilience
KHAZAD cipher
Secure Force (SF)
secure IoT
Secure IoT (SIT)
small battery operated devices
spatio-temporal correlation
Spatiotemporal phenomena
video data
video signal processing
efficient encryption
Ciphers
composability
conventional encryption methods
Correlation
correlation methods
Cryptography
Cyber Physical System
cyber physical systems
Cipher
efficient video encryption
encryption
encryption algorithm
Entropy
highly complex encryption process
Histograms
Internet of Things
IoT environment
biblio
Mitigating wormhole attack in MANET using absolute deviation statistical approach
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
MANET Attack Mitigation
wormhole attack mitigation
wormhole attack
Throughput
telecommunication security
telecommunication network routing
Resiliency
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
Metrics
MATLAB simulator
absolute deviation
MANET
fake tunnel
covariance
correlation methods
correlation coefficient
Correlation
composability
Color
AD correlation
absolute deviation statistical approach
absolute deviation correlation coefficient
biblio
Identification of Potential Risks to System Security Using Wavelet Analysis, the Time-and-Frequency Distribution Indicator of the Time Series and the Correlation Analysis of Wavelet-Spectra
Submitted by grigby1 on Fri, 03/15/2019 - 10:55am
Resiliency
wavelet transforms
wavelet spectra correlation analysis
wavelet analysis
time-and-frequency localization
time-and-frequency distribution
Time series analysis
time series
Time Frequency Analysis
system security
security
Scalability
Accidents
resilience
pubcrawl
potential system security threat prediction identification
potential risks
potential risk
Metrics
Injuries
correlation methods
Correlation analysis
Correlation
biblio
CNNs with cross-correlation matching for face recognition in video surveillance using a single training sample per person
Submitted by K_Hooper on Wed, 04/04/2018 - 8:56am
image representation
video surveillance
triplet-loss optimization methods
Training
still-to-video FR systems
single training sample
Scalability
Robustness
Resiliency
pubcrawl
Pipelines
optimization
optimisation
neural nets
matrix Hadamard product
adaptive weighted cross-correlation
image matching
Human behavior
Hadamard matrices
feature extraction
face recognition systems
face recognition
Face
discriminant face representations
cross-correlation matching
correlation methods
convolution
CCM-CNN parameters
camera distributed network
1
2
next ›
last »