Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Physical layer
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
orthogonal codes
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
transmitting antennas
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
Buildings
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
pubcrawl
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
biblio
Ultimate Secrecy in Wireless Communications
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
attenuation
Information Reuse and Security
ultimate secrecy
secrecy benchmarks
radio frequencies
power 1.0 W to 1000.0 W
frequency reuse
frequency allocation
frequency 1.0 GHz to 1000.0 GHz
communication secrecy
bandwidth saving method
Receivers
Wireless communications
radio transmitters
Propagation losses
Compositionality
Physical layer
Bandwidth
pubcrawl
Resiliency
telecommunication security
biblio
A Cyber-Physical Interaction Model Based Impact Assessment of Cyberattacks for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:45am
Acceleration
IoV protection
IoV cyberattacks
intelligence traffic systems
impact assessment
economy development
cyberphysical interaction
cyber layer
attack impact
cyber physical systems
Internet of Vehicles
ITS
Intelligent Transportation Systems
National security
security of data
Human Factors
Physical layer
Mathematical model
Cybersecurity
Analytical models
Metrics
Roads
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Internet of Things
Computer crime
biblio
Asymmetric Physical Layer Encryption for Wireless Communications
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
quantisation (signal)
Wireless communications
quantized information entropy
private channel
possible eavesdroppers
orthogonal frequency-division multiplexing (OFDM)
cryptographic primitive
constellation confusion degree
complex-domain signals
asymmetric PLE
asymmetric physical layer encryption scheme
Asymmetric Encryption
radio receivers
Wireless communication
wireless channels
encryption
Compositionality
Elliptic curve cryptography
physical layer security
Physical layer
public key cryptography
error statistics
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
telecommunication security
Receivers
biblio
Covert Communications in Packet Collision Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
sophisticated receiver
pubcrawl
random access MAC
random access system
Receivers
resilience
Resiliency
Scalability
security
slotted ALOHA
physical-layer models
telecommunication channels
telecommunication security
transmitted signal
transmitter Alice
unauthorized users
watchful adversary Willie
Willie's receiver
wireless system security
covert systems
achievable covert rates
channel capacity
channel coding
composability
Compositionality
Conferences
covert channels
covert communications
covert rate
access protocols
decision theory
Detectors
Measurement
medium-access control layer
Monitoring
packet collision channels
Physical layer
physical layer environment
biblio
Intelligent Architecture and Hybrid Model of Ground and Launch System for Advanced Launch Site
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
Physical layer
internetworking
landing area
launch processes
launch system
launch systems
launch vehicle
middleware
middleware security
network layer
perception layer
Internet of Things
physical objects
policy-based governance
pubcrawl
resilience
Resiliency
security of data
sensors
Space vehicles
test operation
intelligent analysis assessment system
aerospace control
Application Layer
architectural framework
automatic control system crossing
Cloud Computing
command and control systems
composability
data processing system
flight payloads
advanced launch site system
intelligent architecture
intelligent command
intelligent control
intelligent elements
intelligent flight
intelligent functional architecture
intelligent launching region
intelligent system model
intelligent technical area
biblio
ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks
Submitted by grigby1 on Fri, 05/08/2020 - 2:44pm
parametric signal modeling
ECU fingerprinting
eight-channel lengths
electronic control unit (ECU)
feature-set
Image edge detection
in-vehicle control networks
in-vehicle security
Intrusion Detection System (IDS)
lumped element model
Lumped element model (LEM)
machine learning (ML)
modern electric vehicles
on-board communications
data theft
performance matrix (PM)
Physical layer
received signal
receiver operating characteristic (ROC)
spoofing attacks
traditional cybersecurity methods
Transfer functions
transmitted messages
transmitter
Transmitters
transmitting electronic control unit
unique transfer function
Neural Network Security
artificial neural network (ANN)
pubcrawl
policy-based governance
collaboration
computer network security
message authentication
telecommunication security
Cryptographic Protocols
Protocols
neural nets
Metrics
confidentiality
neural network
Artificial Neural Networks
Neural networks
autonomous vehicles
basic security features
CAN messages
CAN network
channel imperfections
channel-specific step response
communication system
Connected autonomous vehicles
control system parameters
Controller area network (CAN)
controller area network protocol
controller area networks
biblio
Study on the Effect of System Parameters on Physical-Layer Security of Optical CDMA Systems
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
encryption
wiretap channel model
system parameters
secrecy capacity
physical-layer security
Physical layer
optical transmission links
optical links
optical fibre networks
optical CDMA systems
Optical CDMA (OCDMA)
OCDMA systems
fibre-optic eavesdropping attacks
Cryptography
cross-correlation characteristics
communication system
code words
code division multiplexing
code division multiple access
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
Crypto-Aided Bayesian Detection of False Data in Short Messages
Submitted by grigby1 on Mon, 12/30/2019 - 2:21pm
Human behavior
Wireless communication
signal processing
short messages
Resiliency
resilience
Relays
pubcrawl
probability
Physical layer
missed detection
maximum a posteriori probability rule
Map
low overhead
low latency
lightweight cryptographic detection
Bayes methods
False Data Injection
False Data Detection
false data
false alarm
Electrostatic discharges
detection outcomes
detection error
detection accuracy
cyber physical systems
Cryptography
cryptographic detection
crypto-aided Bayesian detection framework
Conferences
composability
Bayesian detection
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »