Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Phantoms
biblio
Location Based Privacy Protection Data Interference Method
Submitted by grigby1 on Mon, 10/03/2022 - 12:46pm
Compositionality
Data interference
Soft sensors
Location Privacy in Wireless Networks
location privacy
Phantoms
privacy protection
Publishing
wireless networks
energy consumption
pubcrawl
composability
wireless sensor networks
data privacy
privacy
Resiliency
resilience
Metrics
Human behavior
biblio
Controlling the Communication Overhead of Source Location Privacy Protocols in Multi-hop Communication Wireless Networks
Submitted by grigby1 on Tue, 08/17/2021 - 4:31pm
privacy
wireless sensor networks
Wireless Sensor Network
wireless networks
source location privacy
Routing protocols
Routing
Resiliency
resilience
pubcrawl
communication overhead
Phantoms
phantom routing
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
fake packet routing
energy consumption
Compositionality
biblio
Giga-hertz piezoelectric epitaxial PZT transducer for the application of fingerprint imaging
Submitted by grigby1 on Wed, 01/20/2021 - 4:06pm
resilience
Permittivity
Phantoms
piezoelectric film-substrate structure
piezoelectric films
piezoelectric thin films
piezoelectric transducers
plane wave
PTO transducers
pubcrawl
PZT
reflection coefficient
PbTiO3 epitaxial films
Resiliency
RF magnetron sputtering
Spatial resolution
sputter deposition
sputtering
Substrates
thermoplastic elastomer
transducer surface
Transducers
ultrasonic transducers
fingerprint sensor
acoustic source
Acoustics
composability
conductive La-SrTiO3
elastomers
epitaxial growth
ferroelectric thin films
fingerprint identification
fingerprint imaging
fingerprint phantom
Fingerprint recognition
Acoustic Fingerprints
giga-hertz piezoelectric epitaxial PZT transducer
high dielectric constant
Human behavior
LaSrTiO3
lead compounds
longitudinal wave conversion loss
mechanical scanning
minimum conversion loss images
network analyzer
Pb(ZrxThx)O3
biblio
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
Compositionality
Location Privacy in Wireless Networks
tree-based algorithm
source location privacy routing schemes
SLP routing schemes
routing scheme algorithms
routing algorithms
representative schemes
privacy protection level
network lifetime performance
lowest network lifetime
highest influence
angle-based algorithm
source location privacy
Phantoms
Position measurement
data privacy
energy consumption
network lifetime
telecommunication network routing
Mathematical model
trees (mathematics)
Metrics
Computational modeling
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
telecommunication network routing
Location Privacy in Wireless Networks
tactically positioned agent nodes
source location privacy
random routing techniques
random routing
Phantoms
agent node routing
agent node
adversary
Position measurement
source node
WSN
Compositionality
Safety
Metrics
sensor placement
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
Monitoring
biblio
An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Submitted by BrandonB on Mon, 05/04/2015 - 1:46pm
phantom source
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication power management
Routing protocols
Routing
privacy preservation
privacy
Phantoms
asset monitoring
phantom node
Monitoring
fake packet injection technique
energy efficient routing technique
energy conservation
endangered species monitoring
delays
data privacy
Base stations
base station