Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transmitters
biblio
New Efficient QERPKC based on Partial Discrete Logarithm Problem
Submitted by aekwall on Mon, 03/22/2021 - 12:15pm
Elliptic curve cryptography
quadratic exponentiation randomized public key cryptosystem
QERPKC
QER
PDLP hardness
PDLP
partial discrete logarithm problem
exponentiation
PKC
Transmitters
public key encryption
Safety
Security analysis
computational complexity
public key cryptography
Cryptography
pubcrawl
Resiliency
Protocols
security
encryption
Scalability
biblio
On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems
Submitted by grigby1 on Wed, 02/10/2021 - 11:52am
Bit error rate
three-step countermeasure
thermal covert channel attacks
Thermal Covert Channel
TCC attack
signal frequency scanning
manycore systems
Many-core systems
dynamic voltage frequency scaling technique
DVFS technique
Defense against Covert Channel Attack
critical defense issue
Multicore processing
signal detection
security of data
covert channels
error statistics
Temperature sensors
Transmitters
Compositionality
Receivers
multiprocessing systems
thermal noise
Scalability
Resiliency
resilience
pubcrawl
biblio
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
Submitted by grigby1 on Wed, 02/10/2021 - 11:52am
potentially unintentional interactions
FPGA-to-FPGA
FPGAs
GPU-to-FPGA covert channels
hardware accelerators
highly-sensitive data
independent boards
Kintex 7 FPGA chips
local cloud FPGA
off-the-shelf Xilinx boards
per-user basis
potential countermeasures
FPGA security
Power Attacks
power supply unit leakage
Power supply units
receiving circuits
reconfigurable integrated circuits
Ring oscillators
sensing stressing ring oscillators
shared infrastructures
shared power supply units
sink FPGA
source FPGA
covert channels
pubcrawl
resilience
Resiliency
field programmable gate arrays
Hardware
Scalability
cloud environments
Compositionality
Voltage measurement
Transmitters
cryptographic keys
Cryptography
Field-Programmable Gate Arrays
Temperature measurement
Voltage control
Voltage regulators
APSULe
CPU-to-FPGA
cross-board leakage
cross-FPGA covert-channel attacks
data center infrastructure
different data center tenants
biblio
Covert Communication by Exploiting Node Multiplicity and Channel Variations
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
error statistics
wireless broadcast networks
superposition coding
Propagation losses
private message
pre-shared secret
noncovert users
noncovert message
node multiplicity
low probability of detection (LPD)
detection probability
detection error probability
channel variation
covert channels
Information hiding
covert communication
pubcrawl
error probability
covert message
broadcast channels
Transmitters
uncertainty
wireless channels
Compositionality
Receivers
radio networks
Wireless communication
Scalability
telecommunication security
Throughput
Resiliency
resilience
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
covert channels
modulation method
modulation
jam system
interference algorithm
fifth generation mobile network
diversity reception
diversity networks
distributing jammer
distributed jamming system
co-constructing and sharing
5g network
5G mobile network
radiofrequency interference
Jamming
security
Interference
covert channel
covert timing channel
Transmitters
timing
Compositionality
network security
5G mobile communication
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
Servers
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
internet
Transmitters
time series
telecommunication channels
Receivers
public communication channel
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
Lyapunov-based adaptive technique
Lyapunov methods
chaotic cryptography
Encryption technique
Cryptography
crypto-analysis methods
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
pubcrawl
biblio
Digital Dynamic Chaos-Based Encryption System in a Research Project of the Department of Marine Electronics
Submitted by aekwall on Mon, 01/18/2021 - 10:22am
chaotic cryptography
signal generators
research project
digital dynamic chaos-based encryption system
digital data encryption system
Department of Marine Electronics
chaotic signal generation
computer systems
information
Trajectory
Transmitters
Scalability
chaotic communication
chaos
Mathematical model
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Servers
biblio
A Novel Jamming Attacks Detection Approach Based on Machine Learning for Wireless Communication
Submitted by aekwall on Mon, 12/14/2020 - 11:32am
channel surfing
5G
time series
Transmitters
Wireless communication
random forests
Jamming
wireless network
Forestry
random forest algorithm
wireless channels
detection probability
false alarm probability
jamming attacks
jamming attacks detection
jamming signal detection
millimeter wave bands
Random Fores
smart jammers
pubcrawl
telecommunication security
game theory
machine learning algorithms
Support vector machines
support vector machine
learning (artificial intelligence)
machine learning
Resiliency
Receivers
composability
Vegetation
neural network
Fuzzy logic
probability
telecommunication computing
signal detection
Predictive Metrics
biblio
Analysis of Local Secure Connectivity of Legitimate User in Stochastic Wireless Networks
Submitted by grigby1 on Fri, 11/20/2020 - 12:52pm
secure connection probability
Rayleigh channels
corresponding isolated secure probability
density ratio
eavesdropper collusion
isolated security probability
legitimate user
local secure connectivity
Rayleigh fading
physical layer security
secure wireless communication
secure wireless connection
stochastic networks
stochastic wireless networks
wireless channel conditions
wireless channel fading
Stochastic Computing Security
wireless channels
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Communication system security
radio networks
Receivers
security
wireless networks
Stochastic processes
probability
Monte-Carlo simulation
Monte Carlo methods
Transmitters
fading channels
biblio
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory
Submitted by grigby1 on Tue, 11/17/2020 - 1:51pm
probability
mean-field game theory
military computing
mobile ad hoc network
mobile ad hoc networks
neural nets
neural network
online reinforcement learning
optimal decentralized power allocation
optimal power allocation algorithms
Mean-field game
pubcrawl
Reinforcement learning
resource management
Scalability
self-organizing features
tactical edge
Transmitters
wireless connection population
Human Factors
Artificial Neural Networks
Cost function
dynamic power allocation
Fokker-Planck equation
Fokker-Planck-Kolmogorov equation
game theory
Hamiltonian-Jacobian-Bellman equation
Heuristic algorithms
actor-critic-mass algorithm
intelligent decentralized dynamic power allocation
Interference
Internet of battlefield things
Internet of Things
iobt
learning (artificial intelligence)
MANET
Mathematical model
« first
‹ previous
1
2
3
4
5
6
next ›
last »