Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transmitters
biblio
On Secrecy Sum-Rate of Artificial-Noise-Aided Multi-user Visible Light Communication Systems
Submitted by aekwall on Tue, 05/10/2022 - 12:44pm
simulation
Conferences
pubcrawl
Scalability
Metrics
Resiliency
Receivers
physical layer security
light emitting diodes
artificial noise
secrecy rate
Transmitters
Upper bound
visible light communication
Visible Light Communications Security
biblio
Data Security And Recovery Approach Using Elliptic Curve Cryptography
Submitted by grigby1 on Thu, 05/05/2022 - 1:19pm
Cloud Computing
composability
Cryptography
decryption
Elliptic curve cryptography
Elliptic curves
encryption
Metrics
pubcrawl
Public key
recovery
resilience
Resiliency
Scalability
Software
Transmitters
biblio
Covert Channel-Based Transmitter Authentication in Controller Area Networks
Submitted by grigby1 on Tue, 04/19/2022 - 2:16pm
Manganese
Transmitters
Transmitter authentication
Throughput
Scalability
Resiliency
resilience
pubcrawl
Protocols
Monitoring
authentication
Intrusion Detection
Cyber-Physical System (CPS) security
covert channels
covert channel
Controller area network (CAN)
Compositionality
composability
Clocks
biblio
Communication System Based on Chaotic Time-Delayed Feedback Generator
Submitted by grigby1 on Thu, 02/10/2022 - 1:08pm
Transmitters
Receivers
Generators
Correlation
Communication Systems
chaotic communication
chaotic carrier
broadband signals
biblio
Stochastic-Adversarial Channels: Online Adversaries With Feedback Snooping
Submitted by aekwall on Mon, 12/20/2021 - 11:29am
Reliability
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
encoding
Stochastic processes
Channel models
Transmitters
Adversary Models
biblio
A Cluster-Based Cooperative Jamming Scheme for Secure Communication in Wireless Sensor Network
Submitted by grigby1 on Mon, 11/08/2021 - 12:35pm
Receivers
wireless sensor networks
Wireless communication
Transmitters
simulation
sensor security
security
Resiliency
resilience
cluster-based WSNs
pubcrawl
physical layer security
orthogonality
Metrics
Jamming
Human behavior
cooperative jamming
composability
biblio
Underwater Jamming Attacks as Incomplete Information Games
Submitted by grigby1 on Thu, 07/08/2021 - 2:02pm
Receivers
Underwater Networks
underwater acoustic networks
Transmitters
security in underwater networks
security
Scalability
Resiliency
resilience
batteries
pubcrawl
Metrics
Jamming
Games
game theory
error probability
Cyber Physical System
biblio
On Using Camera-based Visible Light Communication for Security Protocols
Submitted by aekwall on Tue, 05/18/2021 - 2:14pm
Scalability
security
Protocols
Software
Resiliency
pubcrawl
Metrics
Cameras
Transmitters
Ring lasers
VLC
visible light communication
camera
LED Ring
Visible Light Communications Security
biblio
Wireless Information-Theoretic Security for moving users in autonomic networks
Submitted by aekwall on Thu, 04/08/2021 - 3:39pm
probability
information theoretic security
Wireless Information-Theoretic Security
wireless information theoretic security
secrecy capacity
outage secrecy capacity
nonzero secrecy capacity
moving users
low speed mobility
autonomic networks
Physical layer
Rayleigh fading
Transmitters
radio access networks
security of data
Signal to noise ratio
Capacity planning
Metrics
Wireless communication
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
Scalability
biblio
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 3:38pm
Performance Metrics
information theoretic security
standard authentication tags generation
Rijndael cipher
quantization
packet-based transmission
message authentication codes
Information-theoretic authentication codes
false acceptance probability
conditional equivocation
complexity-theoretic MAC
completeness error
channel coding and decoding
artificial-noise-aided message authentication codes
ANA-MAC
cryptographic primitive
Scalability
key recovery attack
Transmitters
Physical layer
information-theoretic security
channel coding
message authentication
information theory
authentication
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Receivers
Cryptography
« first
‹ previous
1
2
3
4
5
6
next ›
last »