Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transmitters
biblio
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Submitted by aekwall on Mon, 09/28/2020 - 11:16am
enhanced device identity
communication technologies
communication reliability
operational efficiency
hardware-software codesign
cyber physical systems
quality of services
Blockchain protocols
Byzantine actor
citizen welfare
distribution framework
Transmitters
entity trust
hardware-software codesign approach
IoT-CPS
multitier methodology
radio frequency-distinct native attributes
RF-DNA
RF-DNA Fingerprinting
system trustworthiness
trust-building
CPS Privacy
Wireless communication
computer network security
data privacy
Internet of Things
Cryptographic Protocols
Trusted Computing
Support vector machines
cyber-physical systems
Human behavior
pubcrawl
Communication system security
IoT
blockchain
internet
privacy
cryptocurrencies
quality of service
authentication
Human Factors
smart cities
Trust management
biblio
Density Imaging Using a Compressive Sampling DBIM approach
Submitted by aekwall on Mon, 09/14/2020 - 11:29am
Inverse Problems
Ultrasound tomography
Ultrasonic variables measurement
ultrasonic imaging
Transmitters
Tomography
Resiliency
Receivers
pubcrawl
privacy
microwave imaging
medical image processing
measurement systems
measurement system
Iterative methods
inverse scattering
composability
imaging time
image recovery quality
Image reconstruction
Image quality
Image coding
Distorted Born iterative method (DBIM)
distorted Born iterative method
density information
density imaging
DBIM method
cyber-physical systems
compressive sampling technique
compressive sampling DBIM approach
compressive sampling (CS)
compressive sampling
biblio
If Air-Gap Attacks Encounter the Mimic Defense
Submitted by grigby1 on Fri, 08/07/2020 - 2:37pm
resilience
mimic defense
Hard disks
Electromagnetic radiation
dynamic heterogeneous redundancy structure
dynamic heterogeneous redundancy
DHR structure
air-gap attacks
air-gap attackers
Air gaps
game theory
Transmitters
Atmospheric modeling
security
Metrics
malicious software
malware
composability
network attack
Intrusion Detection
computer network security
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
biblio
Embedding Covert Information on a Given Broadcast Code
Submitted by grigby1 on Tue, 06/02/2020 - 10:54am
random codes
information theoretic security
information-theoretic security
Low Probability of Detection
Metrics
necessary conditions
original broadcast communication
policy-based governance
Probability distribution
pubcrawl
Indexes
random coding argument
Random variables
Receivers
resilience
Resiliency
Scalability
stronger receiver
Transmitters
weaker receiver
decoding error probability
Broadcast Channel
broadcast channels
broadcast code
channel capacity
channel coding
covert communication
covert communications
covert message
Decoding
asymptotic fundamental limits
degraded discrete memoryless broadcast channel
DM-BC
embedding covert information
error probability
error statistics
general DM-BCs
Human behavior
Human Factors
biblio
ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 1:44pm
parametric signal modeling
ECU fingerprinting
eight-channel lengths
electronic control unit (ECU)
feature-set
Image edge detection
in-vehicle control networks
in-vehicle security
Intrusion Detection System (IDS)
lumped element model
Lumped element model (LEM)
machine learning (ML)
modern electric vehicles
on-board communications
data theft
performance matrix (PM)
Physical layer
received signal
receiver operating characteristic (ROC)
spoofing attacks
traditional cybersecurity methods
Transfer functions
transmitted messages
transmitter
Transmitters
transmitting electronic control unit
unique transfer function
Neural Network Security
artificial neural network (ANN)
pubcrawl
policy-based governance
collaboration
computer network security
message authentication
telecommunication security
Cryptographic Protocols
Protocols
neural nets
Metrics
confidentiality
neural network
Artificial Neural Networks
Neural networks
autonomous vehicles
basic security features
CAN messages
CAN network
channel imperfections
channel-specific step response
communication system
Connected autonomous vehicles
control system parameters
Controller area network (CAN)
controller area network protocol
controller area networks
biblio
Wideband Electromagnetic Dynamic Acoustic Transducer as a Standard Acoustic Source for Air-coupled Ultrasonic Sensors
Submitted by aekwall on Mon, 01/13/2020 - 11:07am
Scalability
Receivers
Resiliency
Human behavior
pubcrawl
sensors
Transmitters
Acoustics
acoustic source
air-coupled ultrasonic measurement
flexural ultrasonic transducer
microphones
Wideband
wideband electromagnetic dynamic acoustic transducer
acoustic coupling
biblio
RSS-Based Localization with Maximum Likelihood Estimation for PUE Attacker Detection in Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 9:55am
pubcrawl
wireless channels
Transmitters
telecommunication security
Signal to noise ratio
RSS-based localization method
RSS-based localization
Resiliency
resilience
Receivers
radiofrequency interference
radio spectrum management
PUE attacker detection
cognitive radio
primary user signals
primary user emulation attacker
primary user emulation attack
mobile users
mobile radio
maximum likelihood estimation
Mathematical model
licensed users
emulation
cognitive radio technology
Cognitive Radio Security
cognitive radio networks
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
chaotic encryption
two encryption levels
SSSNR
speech processing
signal denoising
secure speech communication system
scrambling
public channels
MatLab simulation
masking
communication security
Chaotic systems
chaotic scrambling and masking
chaotic scrambling
chaotic masking
Chaotic maps
Cryptography
channel problems
Transmitters
chaotic cryptography
chaotic communication
Predictive Metrics
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
telecommunication security
Receivers
encryption
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
« first
‹ previous
1
2
3
4
5
6
next ›
last »