Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Physical layer
biblio
A Lightweight and Efficient Physical Layer Key Generation Mechanism for MANETs
Submitted by aekwall on Mon, 08/02/2021 - 3:07pm
Wireless communication
pubcrawl
Metrics
Resiliency
Compositionality
channel reciprocity
channel state information
discrete cosine transform
discrete cosine transforms
key generation
parity check codes
Physical layer
Reflective binary codes
transceivers
manet privacy
biblio
Node Authentication in Underwater Acoustic Sensor Networks Using Time-Reversal
Submitted by grigby1 on Thu, 07/08/2021 - 2:56pm
Resiliency
Underwater Networks
Underwater acoustics
underwater acoustic communication
time-reversal (TR)
simulation
signal processing
security
Scalability
authentication
resilience
pubcrawl
physical layer security
Physical layer
Metrics
Focusing
Databases
Cyber Physical System
biblio
False Data Injection Attack Detection Before Decoding in DF Cooperative Relay Network
Submitted by grigby1 on Wed, 06/30/2021 - 3:19pm
outage probability
unified error sufficient statistic
Signal to noise ratio
Resiliency
resilience
relay networks (telecommunication)
pubcrawl
probability
power system reliability
Physical layer
composability
Human Factors
Human behavior
FDI attack detection
False Data Detection
DF cooperative relay network
Detectors
Decoding
cyber physical systems
biblio
Robust Cross-Layer Security Framework For Internet of Things Enabled Wireless Sensor Networks
Submitted by grigby1 on Tue, 05/25/2021 - 2:18pm
man-in-middle attack
wireless sensor networks
security
Robustness
Resiliency
resilience
pubcrawl
Physical layer
Monitoring
Cross Layer Security
Internet of Things
Energy Efficiency
cross-layer technique
composability
Clustering algorithms
clustering
attacker
biblio
Universal Hashing for Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:43pm
Physical layer
wiretap coding
wiretap codes
modular coding schemes
information coding
2-universal hash family
telecommunication services
Random variables
secret key agreement
information theoretic security
Communication channels
encoding
Noise measurement
Scalability
information-theoretic security
information theory
Metrics
Cryptography
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
private key cryptography
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
anonymous system timing analysis
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
information-theoretic security
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
Communication system security
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
security of data
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
biblio
Wireless Information-Theoretic Security for moving users in autonomic networks
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
Wireless Information-Theoretic Security
wireless information theoretic security
secrecy capacity
outage secrecy capacity
nonzero secrecy capacity
moving users
low speed mobility
autonomic networks
Physical layer
Rayleigh fading
Transmitters
radio access networks
security of data
Signal to noise ratio
Capacity planning
Metrics
Wireless communication
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
Scalability
biblio
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:38pm
Performance Metrics
information theoretic security
standard authentication tags generation
Rijndael cipher
quantization
packet-based transmission
message authentication codes
Information-theoretic authentication codes
false acceptance probability
conditional equivocation
complexity-theoretic MAC
completeness error
channel coding and decoding
artificial-noise-aided message authentication codes
ANA-MAC
cryptographic primitive
Scalability
key recovery attack
Transmitters
Physical layer
information-theoretic security
channel coding
message authentication
information theory
authentication
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Receivers
Cryptography
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
Clocks
wireless security
wireless communication scheme
transmitters identification
Software Defined Radios
physical-layer fingerprinting approach
low cost SDR
communication protocol
Bluetooth scan
Bluetooth devices fingerprinting
authentication layer
software radio
bluetooth security
Bluetooth
Physical layer
Synchronization
fingerprint identification
composability
Wireless communication
Communication system security
Protocols
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems
Submitted by grigby1 on Tue, 12/15/2020 - 1:41pm
robots
policy-based governance
POMDP
pubcrawl
resilience
Resiliency
resilient control
resilient mechanism
robot operating systems
Physical layer
ROS agent
secure mechanism
security
security mechanism
security of data
security performance
Service robots
time-delay controller
delays
control systems
cross-layer secure approach
Cryptography
cyber-physical nature
cyber-physical systems
decision theory
delay systems
delay-sensitive networked robot operating systems
control engineering computing
Human behavior
Human Factors
industrial robots
Markov processes
networked communication
operating systems (computers)
Partially Observed Markov Decision Process
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »