Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
simulation
biblio
Research on Enterprise Information Security Risk Assessment System Based on Bayesian Neural Network
Submitted by grigby1 on Fri, 04/28/2023 - 4:00pm
Data models
fuzzy theory
Bayesian Regularization
policy governance
Resiliency
computer theory
risk assessment
Stability criteria
simulation
Compositionality
composability
Training
resilience
Metrics
Human behavior
pubcrawl
Neural networks
security
Organizations
information security
collaboration
biblio
A Game Theory based Attacker Defender Model for IDS in Cloud Security
Submitted by grigby1 on Fri, 04/28/2023 - 4:00pm
game theory
Whales
simulation
security
Resiliency
resilience
pubcrawl
policy governance
optimization
Neural networks
Metrics
Human behavior
IDS
estimation
Deep Neural Network
deep learning
computer theory
Computational modeling
Compositionality
composability
collaboration
cloud computing security
Cloud Computing
CICIDS-2018 dataset
biblio
Deterministic Ziv-Zakai Bound for Compressive Time Delay Estimation
Submitted by grigby1 on Fri, 04/28/2023 - 12:54pm
simulation
Ziv-Zakai bound
time delay estimation
Bayesian estimation
compressive sampling
compressive sensing
cyber-physical system
mean square error
Radar
Bayes methods
pubcrawl
Delay effects
Receivers
sensors
composability
estimation
privacy
Resiliency
resilience
biblio
Development and Analysis of Sparse Spasmodic Sampling Techniques
Submitted by grigby1 on Fri, 04/28/2023 - 12:52pm
compressive sampling
Sparse Spasmodic Sampling
Sparse Representation
Electrocardiogram (ECG)
Compressive Sensing Reconstruction
Compressive Sensing acquisition
compressive sensing (CS)
Biomedical measurement
greedy algorithms
Reconstruction algorithms
pubcrawl
compressed sensing
cyber-physical system
simulation
sensors
composability
privacy
Generators
Resiliency
resilience
biblio
Local Constraint-Based Ordered Statistics Decoding for Short Block Codes
Submitted by grigby1 on Fri, 04/28/2023 - 11:52am
Compositionality
short block codes
ordered statistics decoding
List Viterbi decoding
block codes
URLLC
coding theory
Viterbi algorithm
Upper bound
simulation
Cryptography
Decoding
Complexity theory
composability
Conferences
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Clustering with Cross Layer Design against Spectrum Access Attack in Cognitive Radio Networks
Submitted by aekwall on Fri, 04/28/2023 - 9:42am
security
simulation
delays
Routing
feature extraction
pubcrawl
Technological innovation
Physical layer
Resiliency
Cross layer design
cognitive radio
Cross Layer
Jammer attack
multipath routing
PUEA
Cognitive Radio Security
biblio
Threat detection in Cognitive radio networks using SHA-3 algorithm
Submitted by aekwall on Fri, 04/28/2023 - 9:41am
security
simulation
sensors
blockchain
Reliability
malicious users
pubcrawl
diversity reception
blockchains
Resiliency
cognitive radio
Cognitive Radio Network
Secure Hash Algorithm 3
spectrum sensing
Cognitive Radio Security
biblio
Secrecy Outage Performance Analysis for IRS-Aided Cognitive Radio NOMA Networks
Submitted by aekwall on Fri, 04/28/2023 - 9:41am
simulation
probability
pubcrawl
Performance analysis
physical layer security
Resiliency
Rayleigh channels
Monte Carlo methods
NOMA
Non-Orthogonal Multiple Access (NOMA)
cognitive radio
intelligent reflecting surface (IRS)
physical layer security.
Cognitive Radio Security
biblio
Defense Against Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks using Machine Learning
Submitted by aekwall on Fri, 04/28/2023 - 9:40am
simulation
sensors
Support vector machines
pubcrawl
Artificial Neural Networks
network security
classification
Radio frequency
Resiliency
cognitive radio
artificial neural network (ANN)
cognitive radio (CR) networks
spectrum sensing data falsification (SSDF) attack
Cognitive Radio Security
biblio
IAM-BDSS: A Secure Ciphertext-Policy and Identity- Attribute Management Data Sharing Scheme based on Blockchain
Submitted by grigby1 on Fri, 04/14/2023 - 4:12pm
Identity management
Access Control
blockchain
blockchain security
Buildings
Costs
CP-ABE
data privacy
indentity-attribute management
information security
privacy
pubcrawl
Resiliency
Scalability
security
simulation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »