Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
synchronisation
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
Security Evaluation of Counter Synchronization Method for CAN Against DoS Attack
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
light emitting diodes
synchronization message
synchronization deviation
on-board communications
counter value
counter synchronization method
CAN
controller area networks
Security Evaluation
automobile security
replay attack
DoS attack
Automotive engineering
controller area network security
message authentication
Synchronization
synchronisation
pubcrawl
Resiliency
cyber-physical systems
Receivers
Internet of Things
Conferences
computer network security
biblio
Motion-Aware Clock Synchronization for Mobile Ad-Hoc Networks
Submitted by aekwall on Mon, 06/15/2020 - 11:02am
clock synchronization accuracy
round-trip-time correction
resource-constrained scenes
motion-aware clock synchronization
motion information
mobile ad-hoc networks
high-speed scenes
high-speed MANET applications
conventional synchronization algorithms
clock synchronization algorithm
telecommunication security
clock synchronization
forward error correction
mobile ad hoc networks
Metrics
synchronisation
composability
pubcrawl
Resiliency
biblio
A Diffusional Schedule for Traffic Reducing on Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:29pm
Schedules
network on chip
network-on-chip
NoC activities
parallel processing
parallel task execution
power aware computing
Protocols
remote data access
long-distance data synchronization
scheduling
synchronisation
Synchronization
Task Analysis
task mapping algorithm
task schedule
task traffic reduction
traffic distribution
diffusional schedule
network on chip security
Scalability
Resiliency
resilience
Metrics
application-layer optimization
Coherence
diffusional pattern
pubcrawl
energy consumption
energy efficient task schedule
energy saving
energy.
inefficient task schedule strategy
latency
latency reduction
Load modeling
biblio
Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
partially synchronized neural networks
telecommunication security
Synchronization
synchronisation
security verification
Resiliency
resilience
quantum cryptography
pubcrawl
policy-based governance
passive attacks
Artificial Neural Networks
Neurons
Neural Network Security
neural nets
Metrics
machine learning
error rates
error correction codes
error correction
collaboration
biblio
Self-Synchronization of Connected Vehicles in Traffic Networks: What Happens When We Think of Vehicles as Waves?
Submitted by grigby1 on Fri, 04/24/2020 - 12:02pm
road traffic control
oscillating agents
oscillating behaviors
phase-domain layer
privacy
pubcrawl
reference trajectory
resilience
Resiliency
network-wide synchronization
road vehicles
self-synchronization
synchronisation
traffic lights
traffic network
trajectory control
urban grid network
adjacent intersections
multilayer decentralized control strategy
multi-agent systems
moving waves
mobile robots
Metrics
Kuramoto equation
intersection coordination problem
first-order dynamics
decentralized approach
decentralised control
control nonlinearities
connected vehicles
Connected and autonomous vehicles
composability
back-stepping controller
biblio
An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
routing branch
location security
privacy
proxy source node
pubcrawl
Receivers
resilience
Resiliency
Routing
location privacy
Scalability
security
synchronisation
telecommunication network routing
telecommunication security
telecommunication traffic
traffic consumption
wireless sensor networks
Control Theory
Metrics
Location Privacy in Wireless Networks
anonymous routing
anonymous routing strategy for preserving location privacy
ARPLP
base station
Base stations
communication delay
Compositionality
cryptography theory
Cyber Physical System
cyber physical systems
data privacy
energy consumption
Energy Efficiency
Human behavior
location information
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
chaotic encryption
two encryption levels
SSSNR
speech processing
signal denoising
secure speech communication system
scrambling
public channels
MatLab simulation
masking
communication security
Chaotic systems
chaotic scrambling and masking
chaotic scrambling
chaotic masking
Chaotic maps
Cryptography
channel problems
Transmitters
chaotic cryptography
chaotic communication
Predictive Metrics
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
telecommunication security
Receivers
encryption
biblio
Mathematical Models of Blocks for Compensation Multipath Distortion in Spatially Separated Passive Time-Frequency Synchronization Radio System
Submitted by grigby1 on Fri, 03/15/2019 - 11:56am
Scalability
pubcrawl
Radio navigation
radio navigation systems
radio receivers
radio waves multipath propagation
radiofrequency interference
radiowave propagation
resilience
Resiliency
passive time-frequency synchronization radio system
security
signal-to-noise ratio
synchronisation
Synchronization
synchronization distortion
Telecommunications
time and frequency synchronization
Time Frequency Analysis
Time-frequency Analysis
interference-free signal
distortion
error statistics
Fourier transform
Frequency synchronization
frequency synchronization system
frequency synchronization tasks
Interference
interference component
interference suppression
correlation function
Mathematical model
mathematical models
Metrics
multi-position passive synchronization system
multipath compensation
multipath distortion
multipath interference suppressors
multipath signal propagation
biblio
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
Sybil security threat
packet delivery time synchronization
probability of detection
pseudocode algorithm
roadside unit
Routing
Spider monkey time synchronization (SMTS)
spider-monkey time synchronization technique
Sybil attack detection
Sybil attacking strategies
natural spider-monkey behavior
synchronisation
Synchronization
telecommunication power management
time division multiple access
unintended vehicles
VANETs
vehicular ad hoc networks
vehicular collisions
Metrics
destination vehicles
telecommunication security
security
Protocols
pubcrawl
composability
sybil attacks
artificial spider-monkey technique
biology
densely deployed challenge zone
security of data
dynamic VANET system
energy conservation
energy-efficient time synchronization
erroneous messages
legitimate vehicles
malicious nodes
metaheuristic stimulated framework approach
minimized energy consumption
multiple identities
« first
‹ previous
1
2
3
next ›
last »