Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security performance
biblio
On Secrecy Performance in Underlay Cognitive Radio Networks with EH and TAS over α-μ Channel
Submitted by aekwall on Fri, 04/28/2023 - 8:40am
cognitive radio
cognitive radio networks
Cognitive Radio Security
Costs
diversity reception
energy harvesting
fading channels
MRC scheme
Optimal Antenna Selection
pubcrawl
radio transmitters
receiving antennas
Resiliency
security performance
transmitting antennas
α–μ Fading Channel
biblio
Study on Statistical Analysis Method of Decoy-state Quantum Key Distribution with Finite-length Data
Submitted by grigby1 on Tue, 08/31/2021 - 11:10am
Chebyshev approximation
finite-length data
Fluctuations
Human behavior
Metrics
Photonics
pubcrawl
Quantum Key Distribution
random key generation
Random variables
resilience
Resiliency
Scalability
security
security performance
statistical analysis
biblio
An information-theoretic security metric for future wireless communication systems
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
Measurement
quantitative analysis
information theoretic security metric
information theoretic point of view
fine-grained tuning
Abstracts
Random variables
information theoretic security
wireless communication systems
security performance
Security Properties
radio networks
Scalability
Entropy
uncertainty
Metrics
Wireless communication
policy-based governance
pubcrawl
Human behavior
Resiliency
security
telecommunication security
biblio
Secure Communication Based on Reliability-Based Hybrid ARQ and LDPC Codes
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
physical-layer security
additive white gaussian noise channel
additive white Gaussian noise wire-tap channel
Automatic repeat request
bit-error rate
Gaussian approximation
hybrid ARQ
irregular LDPC codes
low-density parity-check codes.
secure communication
posteriori probability log-likelihood ratios
RB-HARQ protocol
re-transmission strategy
re-transmissions
reliability-based hybrid ARQ
reliability-based hybrid automatic repeat-request
unreliable bits
variable nodes
Decoding
Metrics
resilience
Resiliency
telecommunication security
composability
probability
security performance
communication system
pubcrawl
telecommunication network reliability
channel coding
error statistics
network coding
low-density parity-check codes
AWGN channels
parity check codes
biblio
Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems
Submitted by grigby1 on Tue, 12/15/2020 - 12:41pm
robots
policy-based governance
POMDP
pubcrawl
resilience
Resiliency
resilient control
resilient mechanism
robot operating systems
Physical layer
ROS agent
secure mechanism
security
security mechanism
security of data
security performance
Service robots
time-delay controller
delays
control systems
cross-layer secure approach
Cryptography
cyber-physical nature
cyber-physical systems
decision theory
delay systems
delay-sensitive networked robot operating systems
control engineering computing
Human behavior
Human Factors
industrial robots
Markov processes
networked communication
operating systems (computers)
Partially Observed Markov Decision Process
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organization
Submitted by grigby1 on Fri, 11/20/2020 - 1:15pm
Mathematical model
variable perceived value congruence
Task Analysis
self-determination theory
Security policy compliant behaviour
Security Policies Analysis
security performance
security of data
Saudi Arabia
relatedness
pubcrawl
policy-based governance
Personnel
perceived value congruence
perceived legitimacy
organisational aspects
autonomy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
information security
Human Factors
Fortune 600 organization
employees motivation
Electronic mail
Data models
computer security
competence
collaboration
behavioral research
biblio
Enhancement of Moodle learning Management System Regarding Quizzes Security and Stability Problems
Submitted by grigby1 on Fri, 05/08/2020 - 1:19pm
object oriented security
upgraded tool
tools
sudden short disconnection
stability problems
security performance
security of data
security
Resiliency
resilience
quizzes stability
quizzes security
quiz tool features
pubcrawl
online exams
composability
Moodle system environment
Moodle quiz tool
Moodle learning management system
Moodle (Modular Object Oriented Dynamic Learning Environment)
Metrics
Learning management systems
IP networks
information filtering
experimental test Moodle site
enhancement aspects
eLMS (Electronic Learning Management Systems)
Electronic learning
E-Quiz
biblio
A Network Coding Optimization Scheme for Niche Algorithm based on Security Performance
Submitted by grigby1 on Mon, 04/06/2020 - 1:22pm
network overhead
telecommunication security
Statistics
Sociology
SNGA
security performance
security issues
security
Resiliency
resilience
pubcrawl
optimization
optimal solution
Niche genetic algorithm
coding operation
network coding optimization scheme
network coding optimization
network coding
multitarget niche genetic algorithm
Metrics
k-secure network coding mechanism
k-secure network coding
information security
genetic algorithms
fitness function
encoding
cyber physical systems
composability
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 8:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
Submitted by aekwall on Tue, 10/22/2019 - 8:54am
employees motivation
Security Policies Analysis
variable perceived value congruence
self-determination theory
Security policy compliant behaviour
security performance
Saudi Arabia
relatedness
perceived value congruence
perceived legitimacy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
Fortune 600 organization
security of data
competence
behavioral research
autonomy
Human Factors
Personnel
computer security
Mathematical model
organisational aspects
policy-based governance
pubcrawl
Electronic mail
information security
Data models
Task Analysis
1
2
next ›
last »