Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication complexity
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
orthogonal codes
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
transmitting antennas
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
Buildings
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
pubcrawl
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
heterogeneous networked society
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
3D PAKE protocol
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
security threats
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
computer network security
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
biblio
At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid
Submitted by grigby1 on Fri, 11/20/2020 - 1:04pm
Security analysis
policy-based governance
power meters
privacy
privacy-preserving lattice
pubcrawl
resilience
Resiliency
Scalability
security
Metrics
smart appliances
smart energy meters
Smart Grid
smart grid consumer privacy
Smart Grids
smart household appliances
smart meters
smart power grids
encryption
communication complexity
composability
consumer privacy
Cryptography
customer privacy protection
data aggregation
data privacy
domestic appliances
collaboration
home area network appliances
home energy use
homomorphic aggregation scheme
Homomorphic encryption
Human behavior
lattice-based homomorphic encryption
Logic gates
messages confidentiality
biblio
Machine Learning Bluetooth Profile Operation Verification via Monitoring the Transmission Pattern
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
radio frequency output power
electronic engineering computing
Hardware Security
hardware-software security
integrated circuit manufacture
k-nearest neighbor
license communication IC
low computational complexity
low-cost legacy technology
mobile radio
profile classification algorithm
custom low-frequency integrated circuit
RF envelope detector
RF output power
RF Power
signal classification
smart descriptive time-domain feature extraction
Supervisory Circuit
support vector machine
transmission pattern
Cyber Physical System
bluetooth security
cyber physical systems
telecommunication security
pubcrawl
composability
Resiliency
resilience
Human behavior
machine learning
feature extraction
classifier
learning (artificial intelligence)
security
formal verification
Decision Tree
system-on-chip
telecommunication computing
Bluetooth
Blue-tooth
Bluetooth profile operation verification
Bluetooth SoC
Bluetooth System-on-Chip
communication complexity
biblio
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
Training
TCP congestion-control mechanism
support vector machine based machine learning model
PSD based entropy
PSD
power spectral density
malicious LDoS traffic
Low-rate DDoS
LDoS attacks
Entropy.
decision algorithm
complex low-rate DoS attack detection
communication complexity
Predictive Metrics
decision theory
Entropy
Computer crime
SVM
detection algorithms
machine learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Support vector machines
distributed denial of service attack
telecommunication traffic
intrusion detection system
DDoS
computer network security
biblio
Sub-Modular Circuit Design for Self-Balancing Series-Connected IGBTs in a Modular Multilevel Converter
Submitted by aekwall on Mon, 01/20/2020 - 10:47am
pubcrawl
voltage-source convertors
voltage sharing
Voltage control
voltage capacity
Transient analysis
sub-modular level
sub-modular circuit design
sensing complexity
self-balancing series-connected IGBT
Resiliency
Capacitors
modular multilevel converter
MMC
Logic gates
insulated gate bipolar transistors
Gate drivers
expandability
delays
composability
communication complexity
central series IGBT controller
biblio
Interactive Compression to External Information
Submitted by grigby1 on Tue, 12/10/2019 - 10:19am
communication complexity
composability
compressive sampling
Correlated sampling
Cyber Physical System
cyber physical systems
External information cost
information theory
Interactive compression
privacy
pubcrawl
resilience
Resiliency
biblio
A Network Coding Based Information Spreading Approach for Permissioned Blockchain in IoT Settings
Submitted by grigby1 on Mon, 05/20/2019 - 3:29pm
blockchain
collaboration
communication complexity
composability
Human behavior
Human Factors
Information Spreading
information theoretic security
Internet of Things (IoT)
Metrics
permissioned blockchain
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
biblio
Breaking the Circuit-Size Barrier in Secret Sharing
Submitted by grigby1 on Mon, 05/20/2019 - 3:29pm
security
privacy
Cryptography
theoretic techniques
Theory of computation
computational complexity
circuit complexity
communication complexity
Cryptographic Protocols
biblio
A Network Coding Based Information Spreading Approach for Permissioned Blockchain in IoT Settings
Submitted by aekwall on Wed, 01/16/2019 - 1:07pm
resilience
pubcrawl
Metrics
composability
Internet of Things (IoT)
wireless mesh networks
blockchain
communication complexity
Information Spreading
permissioned blockchain
1
2
next ›
last »