Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
simulation
biblio
Impact of Bushfire Dynamics on the Performance of MANETs
Submitted by grigby1 on Tue, 02/08/2022 - 11:48am
Handover
MANET security
Bushfire Communications
Unmanned Aerial Vehicles
QoI
Degradation
MANETs
simulation
Compositionality
Forestry
Ad hoc networks
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
biblio
Resource Allocation Scheme for Secure Transmission in D2D Underlay Communications
Submitted by grigby1 on Mon, 02/07/2022 - 4:49pm
simulation
Microelectronics Security
Secure-aware
power control
Physical lay security
Device-to-Device(D2D)
Microelectronics
Systems architecture
physical layer security
pubcrawl
Receivers
composability
Cellular networks
performance evaluation
Resiliency
resilience
Metrics
biblio
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks
Submitted by aekwall on Fri, 02/04/2022 - 10:31am
attacks
Repudiation
X.509 PKI
Vehicle-to-grid
Vehicle to Grid
security requirements
ISO standards
ISO 15118 Standard
data integrity
simulation
composability
Human behavior
Resiliency
Metrics
pubcrawl
Protocols
authentication
Computational modeling
biblio
Identification of Transformer Magnetizing Inrush Current Based on Empirical Mode Decomposition
Submitted by aekwall on Fri, 02/04/2022 - 10:21am
simulation
Indexes
Internet of Things
pubcrawl
Resiliency
Technological innovation
Compositionality
Prediction algorithms
remanence
Artificial Intelligence
Artificial intelligence algorithm
Empirical mode decomposition
magnetizing inrush current
Mean impact value
noise reduction
cyber physical systems
biblio
Mixed Initiative Balance of Human-Swarm Teaming in Surveillance via Reinforcement learning
Submitted by grigby1 on Thu, 02/03/2022 - 4:19pm
pubcrawl
resilience
Resiliency
Computational modeling
Decision Making
resource management
Complexity theory
simulation
surveillance
Reinforcement learning
Human Factors
Robot Trust
Human-Swarm Teaming
Mixed Initiative Balance
Robust Persistent Surveillance
biblio
Performance Comparison of Swarm Intelligence Algorithms for Web Caching Strategy
Submitted by grigby1 on Mon, 01/31/2022 - 5:39pm
Linear programming
cached data optimization
BPSO
Web Caching
particle swarm optimization
GA
ACO
Satellites
Problem-solving
Servers
Time factors
simulation
Scalability
Resiliency
resilience
Metrics
pubcrawl
biblio
Web Caching Strategy Optimization Based on Ant Colony Optimization and Genetic Algorithm
Submitted by grigby1 on Mon, 01/31/2022 - 5:39pm
Linear programming
Web Caching
Seminars
particle swarm optimization
Knapsack Problem
GA
cached data
ACO
Ant colony optimization
Servers
simulation
Scalability
optimization
Resiliency
resilience
Metrics
pubcrawl
biblio
An Efficient Group Secret Key Generation Scheme for Wireless Sensor Network
Submitted by aekwall on Mon, 01/31/2022 - 4:15pm
simulation
wireless sensor networks
pubcrawl
Metrics
Resiliency
composability
Smart Grids
wireless networks
physical layer security
Mesh networks
wireless mesh networks
code-domain
error correction codes
group secret key generation
information exchanges
biblio
On the RIS Manipulating Attack and Its Countermeasures in Physical-Layer Key Generation
Submitted by grigby1 on Tue, 01/11/2022 - 10:36am
reconfigurable intelligent surfaces
Wireless communication
Vehicular and wireless technologies
simulation
secret key generation
Scalability
Resiliency
resilience
reflection coefficient
active attack
reconfigurable intelligent surface
Quantization (signal)
pubcrawl
physical layer security
OFDM
Metrics
attack surface
biblio
A Honeypot-based Attack Detection Method for Networked Inverted Pendulum System
Submitted by aekwall on Mon, 01/10/2022 - 12:54pm
simulation
Support vector machines
Data models
Training
pubcrawl
Scalability
Resiliency
Human behavior
cyberattack
Detectors
control systems
covert attacks
networked inverted pendulum system
NipsPot
supported vector machine
Attack vectors
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »