Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure communication
biblio
Residual Energy Analysis with Physical-Layer Security for Energy-Constrained UAV Cognitive Radio Systems
Submitted by aekwall on Mon, 03/15/2021 - 11:03am
cognitive radio
Cognitive Radio Security
sensing performance
secrecy outage
secondary link performance
residual energy analysis
energy-constraint
energy-constrained UAV cognitive radio systems
energy harvesting drone
Unmanned Aerial Vehicles
telecommunication security
energy harvesting
autonomous aerial vehicles
constrained optimization problem
secure communication
physical-layer security
residual energy
optimisation
pubcrawl
Resiliency
biblio
Secure Communication Based on Reliability-Based Hybrid ARQ and LDPC Codes
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
physical-layer security
additive white gaussian noise channel
additive white Gaussian noise wire-tap channel
Automatic repeat request
bit-error rate
Gaussian approximation
hybrid ARQ
irregular LDPC codes
low-density parity-check codes.
secure communication
posteriori probability log-likelihood ratios
RB-HARQ protocol
re-transmission strategy
re-transmissions
reliability-based hybrid ARQ
reliability-based hybrid automatic repeat-request
unreliable bits
variable nodes
Decoding
Metrics
resilience
Resiliency
telecommunication security
composability
probability
security performance
communication system
pubcrawl
telecommunication network reliability
channel coding
error statistics
network coding
low-density parity-check codes
AWGN channels
parity check codes
biblio
Behavior Modeling and Individual Recognition of Sonar Transmitter for Secure Communication in UASNs
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
sonar transmitter
radio transmitters
received signal
resilience
Resiliency
secure communication
Sonar
Sonar equipment
sonar signal processing
radio frequency fingerprint
specific emitter identification
specific emitter recognition
UASN
underwater acoustic communication
underwater acoustic sensor networks
Underwater vehicles
wireless sensor networks
Acoustic Fingerprints
pubcrawl
power spectrum features
power amplifier
nonlinear model
memory polynomial model
low-frequency radiation source
individual recognition
Human behavior
fingerprint features
feature extraction
Computational modeling
composability
Class D power amplifier
behavior modeling
Analytical models
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 11:29am
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
fusion center
AF-CSSCRN security
Amplify-and-Forward
amplify-and-forward cooperative spectrum sensing
antenna arrays
average secrecy rate
cognitive relay
CRN
external malicious threats
fifth-generation systems
AF-CSS
Geometry
multiple antennas
secondary users
secure communication
secure transmission
spectrum sensing data
stochastic geometry
Cognitive Radio Security
physical layer security
resilience
Resiliency
telecommunication security
5G mobile communication
sensor fusion
Communication system security
Stochastic processes
cooperative communication
pubcrawl
cognitive radio
radio spectrum management
signal detection
amplify and forward communication
Cognitive Radio Network
cognitive radio networks
5G systems
access points
biblio
Synchronization for three chaotic systems with different structures and its application in secure communication
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
encrypted information signal
telecommunication security
synchronized receiver
synchronisation
stability
secure communication
Resiliency
pubcrawl
Predictive Metrics
multistage chaotic synchronized secure communication system
Lyapunov stability theory
Lyapunov methods
adaptive synchronization method
discrete signal
different order chaotic systems
Cryptography
continuous signal
composability
chaotic masking
chaotic cryptography
chaotic communication
chaos synchronization
Chaos encryption
biblio
Efficient Technique Image Encryption with Cipher Block Chaining and Gingerbreadman Map
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
efficient technique image encryption
unified average change intensity
testing
secure communication
Resiliency
resilience
pubcrawl
pixel change rate
key cipher block chaining
Image Processing
Gingerbreadman map
encryption
button sensitivity
efficient encryption
digital images
digital image security
Digital Image Crypthography
cyber-physical systems
Cryptography
computer science
composability
Ciphers
cipher block chaining
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
« first
‹ previous
1
2
3
4
5
next ›
last »