Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
access protocols
biblio
Adaptive Flow-Level Scheduling for the IoT MAC
Submitted by grigby1 on Tue, 03/16/2021 - 1:11pm
Schedules
mobile computing
policy-based approach
Protocols
pubcrawl
QoS requirements
quality of service
resilience
Resiliency
Metrics
telecommunication scheduling
WiFi networks
Wireless communication
Wireless fidelity
wireless LAN
wireless MAC
wireless networks
high-density networks
adaptive flow-level scheduling
Admission control
best-effort scheduling
carrier sense multiple access
clean slate
collaboration
distributed CSMA
distributed MAC protocols
access protocols
high-speed mobile Internet access
Human behavior
Internet of Things
IoT communications
IoT MAC
IoT-M2M applications
machine-to-machine communication
biblio
A New Homomorphic Message Authentication Code Scheme for Network Coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
Pollution
vector length
some what homomorphic encryption
security parameter
pollution attacks
packet decoding
network data flow
MAC length
known-plaintext attacks
homomorphic message authentication code
homomorphic MAC scheme
homomorphic mac
encryption
network coding
access protocols
encoding
composability
authentication
telecommunication security
message authentication
Resiliency
resilience
Metrics
pubcrawl
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT-IIoT networks
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
iiot
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
sensors
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
IoT
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
biblio
Throughput Control Method Between Different TCP Variants Based on SP-MAC Over WLAN
Submitted by grigby1 on Wed, 12/02/2020 - 12:52pm
throughput guarantee control method
Synchronization
Synchronization phenomena of Coupled oscillator
synchronization phenomena of coupled oscillators
TCP variants
TCP versions
telecommunication congestion control
Throughput
throughput control method
synchronisation
total throughput
transport protocols
Wireless communication
wireless LAN
wireless local area networks
wireless terminals
WLAN
media access control method
access protocols
carrier sense multiple access
collision avoidance
Compound TCP
Compounds
coupled congestion control
CUBIC-TCP
media access control
access point
Media Access Protocol
Oscillators
pubcrawl
resilience
Resiliency
Scalability
SP-MAC
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
mobile devices security breaches
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
wireless LAN
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
computer network security
tracking
mobile radio
smart phones
Metrics
privacy
Mobile handsets
location privacy
pubcrawl
Human behavior
Resiliency
Protocols
IoT devices
Internet of Things
data privacy
Monitoring
biblio
Design and Evaluation of Jamming Resilient Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:12pm
telecommunication network reliability
Protocols
pubcrawl
random jamming
random strategy
resilience
Resiliency
resource-aware event-triggered control schemes
retrofit ageing
security
sensors
system design challenge
protocol aware strategy
telecommunication security
test-bed results
time-triggered control schemes
water network test-bed
water networks
wireless actuators
Wireless communication
wireless sensor networks
Wireless Sensor/Actuator Networks
wireless sensors
entire CPS failure
aware jamming
classic time-triggered control scheme
constant jamming
constant strategy
control systems
CPS resilience
cyber physical systems
cyber-attacks
cyber-physical systems
design approach
access protocols
event-triggered control
event-triggered control scheme
Jamming
jamming attacks
jamming resilient cyber-physical systems
jamming strategies
large scale infrastructures
next generation cyber-physical systems
physical process
physical processes
biblio
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
MIMO communication
Cross Layer Security
wireless networks on-board aircraft
WAICs technology
system design complexity
standard technologies
secure wireless avionics intra-communications
radioaltimeters
physical cross-layer security design
multiple-input multiple-output systems
Medium Access Control
MAC-PRY cross-layer design
internal aeronautics bus technologies
composability
aircraft communication
telecommunication security
wireless technology
Aircraft
access protocols
radiofrequency interference
avionics
Aerospace electronics
Wireless communication
Communication system security
wireless sensor networks
pubcrawl
Resiliency
computer architecture
security
biblio
Joint PHY/MAC Layer AN-Assisted Security Scheme in SVD-Based MIMO HARQ system
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
MIMO HARQ system
cross-layer security design
data rate performance
data rates
explosive data growth
HARQ protocol
high data rate requirement
joint PHY/MAC layer AN-assisted security scheme
low data rates
artificial noise design
multiple input multiple output hybrid automatic retransmission request system
parallel subchannels
singular value decomposition
SVD
SVD-based MIMO HARQ system
transmitting antennas
Cross Layer Security
telecommunication security
composability
Automatic repeat request
MIMO communication
receiving antennas
Cross-Layer Security
fading channels
access protocols
artificial noise
wireless channels
Internet of Things
5G mobile communication
pubcrawl
Resiliency
information security
security
biblio
Covert Communications in Packet Collision Channels
Submitted by grigby1 on Thu, 07/16/2020 - 11:17am
sophisticated receiver
pubcrawl
random access MAC
random access system
Receivers
resilience
Resiliency
Scalability
security
slotted ALOHA
physical-layer models
telecommunication channels
telecommunication security
transmitted signal
transmitter Alice
unauthorized users
watchful adversary Willie
Willie's receiver
wireless system security
covert systems
achievable covert rates
channel capacity
channel coding
composability
Compositionality
Conferences
covert channels
covert communications
covert rate
access protocols
decision theory
Detectors
Measurement
medium-access control layer
Monitoring
packet collision channels
Physical layer
physical layer environment
biblio
Trust is the Cure to Distributed Consensus with Adversaries
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
resilience
Iterative methods
Nonvolatile memory
optimisation
policy-based governance
Policy-Governed Secure Collaboration
Power supplies
Program processors
pubcrawl
Hardware
Resiliency
Scalability
social engineering networked systems
Task Analysis
trust evaluation mechanism
trust graph model
trust propagation scheme
trust-aware consensus algorithm
decision theory
composability
Computer Theory and Trust
access protocols
Byzantine adversary detection
computer science
consensus iteration process
Decision Making
decision making problem
Compositionality
distributed consensus algorithm
distributed consensus problems
distributed optimization
economic engineering networked systems
energy harvesting
false trust
graph theory
1
2
3
next ›
last »