Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cellular radio
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
telecommunication network reliability
Small Cells
small cell technology
reliable communication
Pollution
next generation communication technologies
network coding environment
malicious user identification scheme
fifth generation of communication networks
device to device communication
dense network coding
next generation networks
Microprocessors
5G
network coding
cooperative communication
computer architecture
Communication networks
wireless network
Protocols
composability
cellular radio
5G mobile communication
telecommunication security
Throughput
Resiliency
resilience
Metrics
pubcrawl
Peer-to-peer computing
security
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
biblio
An Odd Couple: Loss-Based Congestion Control and Minimum RTT Scheduling in MPTCP
Submitted by grigby1 on Wed, 12/02/2020 - 2:01pm
minRTT scheduling
transport protocols
telecommunication scheduling
telecommunication congestion control
Scalability
RTT measurement
Resiliency
resilience
queueing theory
pubcrawl
odd couple
multipath TCP
multipath heterogeneous networks
Multi-Path TCP
alternative congestion control algorithms
minRTT scheduler
minimum RTT scheduling
minimum round trip time
loss-based congestion control
head-of-line blocking
deep queues
coupled congestion control
Congestion Control
cellular radio
Cellular networks
bufferbloat
buffer dimensioning
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by aekwall on Tue, 09/08/2020 - 10:13am
chaotic algorithm
wireless mobile communication
voice encryption
voice data security
trunked radio
telecommunication technology
security systems
multiple circular chaotic permutation
multiple circular
multicircular permutations
military radio
GSM network
Global System for Mobile
end-to-end voice encryption
dynamic keys
Cryptography
cellular technologies
voice communication
chaotic cryptography
chaotic communication
Predictive Metrics
GSM
cellular radio
composability
pubcrawl
Resiliency
telecommunication security
Receivers
encryption
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
biblio
Self-Healing Solutions for Wi-Fi Networks to Provide Seamless Handover
Submitted by grigby1 on Mon, 02/17/2020 - 5:12pm
quality of service
wireless LAN
wireless channels
wireless channel
Wi-Fi Networks
uniform seamless network quality of service
unexpected network faults
SON developments
self-organizing network paradigm
self-healing solutions
self-healing networks
seamless handover
Resiliency
resilience
Cellular networks
QoS
pubcrawl
Packet loss
mobility management (mobile radio)
ML algorithms
machine learning algorithms
learning (artificial intelligence)
IEEE 802.11 Standard
Handover
fault tolerant computing
fault diagnosis
composability
cellular radio
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
biblio
Enhancing Security and Scalability in Software Defined LTE Core Networks
Submitted by aekwall on Mon, 06/17/2019 - 10:29am
next generation networks
telecommunication traffic
telecommunication security
software defined networking
software defined LTE core networks
Software
security scalability
security enhancement
security
scalable tunnel establishment
scalable channel security scheme
Scalability
pubcrawl
cellular radio
Next generation networking
next generation cellular network
mobile subscribers
Mobile Security
mobile networks
mobile network design
Mobile communication
LTE core network
Long Term Evolution
Local area networks
composability
Cloud Computing
biblio
Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
optimal beamforming matrix
Downlink
downlink cellular network
eavesdroppers
Interference
legitimate mobile stations
multiple beam forming matrices
novel pseudorandom beamforming technique
opportunistic feedback
opportunistic scheduling
cellular radio
orthogonal beamforming vectors
radio links
Random beamforming
received signal-to-interference-and-noise ratio value
received SINR value
secrecy rate
secrecy sum-rate maximization
signal processing security
Signal to noise ratio
security
Resiliency
pubcrawl
composability
Wireless communication
matrix algebra
Metrics
Vectors
telecommunication security
physical-layer security
antenna arrays
antennas
array signal processing
base station
beam selection
BS
Cellular networks
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices
1
2
3
next ›
last »