Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio access networks
biblio
Wireless Information-Theoretic Security for moving users in autonomic networks
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
Wireless Information-Theoretic Security
wireless information theoretic security
secrecy capacity
outage secrecy capacity
nonzero secrecy capacity
moving users
low speed mobility
autonomic networks
Physical layer
Rayleigh fading
Transmitters
radio access networks
security of data
Signal to noise ratio
Capacity planning
Metrics
Wireless communication
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
Scalability
biblio
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
resource management
dynamic networks
Q-learning solution
network slicing
network slice requests
network optimization
frequency-time blocks
dynamic resource optimization
Dynamic Resource Allocation
computational constraints
5G security
5G radio access network slicing
Bit error rate
Reinforcement learning
learning (artificial intelligence)
Radio Access Network
Dynamic scheduling
resource allocation
telecommunication computing
composability
radio access networks
5G mobile communication
optimization
Throughput
Resiliency
resilience
Metrics
pubcrawl
biblio
Fog Radio Access Networks in Internet of Battlefield Things (IoBT) and Load Balancing Technology
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
load balancing technology
Fog Radio Access networks
Human Factors
Industrial Internet of Things (IIoT)
Industrial IoT
Internet of Things
Internet of Things knowledge
iobt
IoT devices
joint distributed computing
load balancing strategy
Fog Radio Access Network
Load management
local computing
military communication
mobility management (mobile radio)
network edge
pubcrawl
radio access networks
resource allocation
Scalability
ultra low latency
delays
bandwidth efficiency
battlefield efficiency
battlefield Things
C-RAN
Cloud Computing
cloud radio access networks
computer architecture
computing ability
computing capability
content sharing scheme
5G mobile communication
distributed computing
distributed computing load balancing problem
edge computing
Energy Efficiency
F-RAN architecture
F-RAN nodes
fifth generation communication
Fog computing
fog equipment
biblio
Optimizing Spectrum Pooling for Multi-Tenant C-RAN Under Privacy Constraints
Submitted by aekwall on Mon, 09/28/2020 - 12:09pm
participating operators
finite-capacity backhaul links
finite-capacity fronthaul links
fronthaul/backhaul compression strategies
inter-onerator privacy
inter-operator cooperation
inter-tenant privacy constraints
multi-tenant
multitenant C-RAN
multitenant Cloud Radio Access Network system
downlink transmission
privacy constraint
private shared subbands
proprietary radio units
RAN sharing
shared subband
spectrum pooling
user equipments
CPS Privacy
radio access networks
Cloud Computing
data privacy
Human behavior
pubcrawl
privacy
optimization
cyber physical systems
Bandwidth
computer network security
Downlink
Interference
Human Factors
Quantization (signal)
bandwidth allocation
precoding
C-RAN
cloud processor
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
A Construction Method of Security Mechanism Requirement for Wireless Access System Based on CC Standard
Submitted by grigby1 on Tue, 01/21/2020 - 11:33am
Safety
Wireless communication
wireless access system
telecommunication security
standards
security threats
security mechanism requirement construction method
security functions
security functional components
security evaluation standard
security assurance components
Security Assurance
Security Assessment Standards
security
Scalability
collaboration
Resiliency
resilience
radio access networks
pubcrawl
policy-based governance
Metrics
information technology
Information Assurance
incomplete security mechanism
Human behavior
emergency communication network
composability
Communication system security
Communication networks
biblio
SELF-HEALING AND RESILIENCE IN FUTURE 5G COGNITIVE AUTONOMOUS NETWORKS
Submitted by aekwall on Mon, 03/25/2019 - 9:55am
self-healing functions
gaussian distribution
key requirements
Long Term Evolution
managed network functions
mobile network self-healing
multidimensional statistical methods
radio access networks
resilience
future network deployments
SON
SON self-healing
sophisticated machine learning methods
statistical analysis
telecommunication computing
ultra-high reliability
self-healing networks
automated anomaly detection
machine learning
pubcrawl
composability
optimization
Reliability
Anomaly Detection
self-healing
5G mobile communication
learning (artificial intelligence)
Case-Based Reasoning
cognitive network management
critical machine-type communication
degraded states
diagnosis function
future 5G cognitive autonomous networks
future cognitive autonomous mobile networks
biblio
A group-based security protocol for Machine Type Communications in LTE-Advanced
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
LTE-advanced communication
telecommunication security
software verification tool
single authentication server overhead
signalling protocols
signaling congestion reduction
radio access networks
Protocols
performance evaluation
MTC
mobility management (mobile radio)
machine type communication
access network
Long Term Evolution
handover delay
Handover
group-based security protocol
delays
Cryptographic Protocols
computer science
authentication and key agreement
authentication
AKA
biblio
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
honeypots
Web systems
Web attacks
web applications
Web 2.0
vulnerability scans
Support vector machines
radio access networks
malicious cyber activities
internet
attacks
high-interaction honey pots
feature selection method
feature extraction
Encyclopedias
computer network security
classification of malicious cyber activities
Blogs
behavioral clustering analysis
behavioral characteristics
1
2
next ›
last »