Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
energy consumption
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Secure AODV
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Scalability
mobile ad hoc networks
security
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
blackhole attack detection
ad hoc network
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
Attack vectors
black hole AODV
Black hole attack
Black hole attacks
Blackhole Attack (BA)
MANET Attack Detection
composability
Compositionality
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
manet privacy
Metrics
biblio
SharaBLE: A Software Framework for Shared Usage of BLE Devices over the Internet
Submitted by grigby1 on Tue, 12/01/2020 - 4:38pm
Internet of Things
wireless communication technologies
Software
short communication range
Servers
Scalability
RESTful API
Resiliency
resilience
remote BLE IoT devices
pubcrawl
Policy Based Governance
Metrics
Logic gates
Internet-scale Computing Security
application program interfaces
internet
Human Factors
Human behavior
generic service stack
energy consumption
computer network reliability
composability
collaboration
cloud-based software framework
Cloud Computing
bluetooth low energy
Bluetooth
BLE-equipped device
biblio
Synthesizing Energy Consumption Data Using a Mixture Density Network Integrated with Long Short Term Memory
Submitted by grigby1 on Fri, 11/20/2020 - 2:06pm
residential consumer energy consumption
mixture density network
multiple critical infrastructures
policy-based governance
power engineering computing
Power Grid
Predictive models
privacy
privacy concerns
Probability density function
pubcrawl
Metrics
residential smart meters
resilience
Resiliency
Scalability
security
smart cities
smart grid consumer privacy
smart meters
smart power grids
standards
energy consumption
collaboration
commercial consumer energy consumption
Communication networks
composability
data analysis
data dissemination
Data models
data privacy
data storage
data synthesis
centralized data analytics
fully synthetic energy consumption data
Human behavior
human behavioral impacts
information dissemination
load patterns
Logic gates
long short-term memory network
LSTM
MDN
biblio
Smart Meters for Domestic Consumers: Innovative Methods for Identifying Appliances using NIALM
Submitted by grigby1 on Fri, 11/20/2020 - 2:06pm
Resiliency
monitoring process
MPS
NIALM
non commercialization
particular load
policy-based governance
privacy
pubcrawl
resilience
Monitoring
Scalability
sensors
single point sensing
smart grid consumer privacy
smart meters
smart power grids
SPs
Wiring
energy management
appliances identification
collaboration
composability
demand response
demand side management
domestic appliances
electricity energy
electricity power
energy consumption
Aggregates
feature extraction
Home appliances
Human behavior
ICA
independent component analysis
Indian domestic consumers
innovative methods
Metrics
biblio
Load Forecasting of Privacy-Aware Consumers
Submitted by grigby1 on Fri, 11/20/2020 - 2:03pm
Resiliency
polling frequency constraints
power engineering computing
predictive control
Predictive models
privacy
privacy protection schemes
privacy-aware consumers
pubcrawl
regression analysis
report consumption data
resilience
policy-based governance
Scalability
short-term load forecasts
SM data
smaller consumer aggregations
smart grid consumer privacy
smart meter
smart meters
STLF accuracy
Support vector machines
support vector regression
temporal resolutions
high spatial resolutions
composability
consumer aggregation levels
consumer privacy
consumer privacy risks
data privacy
data-driven grid management
Electric Grid
energy consumption
forecast accuracy
forecasting
grid visible consumer load profile
collaboration
higher aggregation levels
Human behavior
load forecasting
Load modeling
load profiles
load-forecasting
load-levelling scheme
Metrics
model-distribution predictive control
Mutual information
planning techniques
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 2:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Cyber security issues of Internet of electric vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:11pm
internet
Servers
sensors
security of data
security
Roads
Resiliency
resilience
pubcrawl
MFemtocell
Metrics
IoEV
Internet of Vehicles
Internet of Things
Internet of electric vehicles
Internet information exhange
5G
Intelligent Transportation Systems
Infrastructure
Human Factors
environmental benefits
Energy Efficiency
energy consumption
energy conservation
electrical vehicle communication
Electric Vehicles
cyber security issues
connected vehicles
Charging stations
battery limit
batteries
biblio
Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
source location privacy
Location Privacy in Wireless Networks
route node
relatively lower energy
modified schemes
inversely proportional relationship
guarantee longer network lifetime
Experimental Evaluation
energy consumption performance
dynamic route creation process
control angle
angle-based routing
source location privacy routing schemes
routing schemes
data privacy
sensor node
Compositionality
energy consumption
Metrics
sensor nodes
wireless sensor networks
Wireless Sensor Network
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
energy consumption
Location Privacy in Wireless Networks
source node localization
source location privacy
protection mechanism
k disjoint paths
intermediate node selection
Energy-efficiency
dynamic and disjoint routing mechanism
DDRM
back-tracing attack
source location privacy protection
Position measurement
WSN
Compositionality
Monitoring
Heuristic algorithms
telecommunication network routing
Metrics
Routing
privacy
graph theory
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »