Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
GSM
biblio
Anomaly Detection in Surveillance Videos Using Deep Learning
Submitted by grigby1 on Fri, 06/23/2023 - 11:08am
deep video
Anomaly Detection
Communication Systems
deep learning
GSM
Knowledge engineering
Metrics
pubcrawl
resilience
Resiliency
Safety
Scalability
security
video surveillance
biblio
Raspberry Pi Based Smart Wearable Device for Women Safety using GPS and GSM Technology
Submitted by grigby1 on Thu, 05/20/2021 - 12:14pm
Scalability
wearables security
wearable computers
Raspberry Pi3
E-mail alert
GSM
Satellites
Universal Serial Bus
GPS
Global Positioning System
privacy
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by aekwall on Tue, 09/08/2020 - 10:13am
chaotic algorithm
wireless mobile communication
voice encryption
voice data security
trunked radio
telecommunication technology
security systems
multiple circular chaotic permutation
multiple circular
multicircular permutations
military radio
GSM network
Global System for Mobile
end-to-end voice encryption
dynamic keys
Cryptography
cellular technologies
voice communication
chaotic cryptography
chaotic communication
Predictive Metrics
GSM
cellular radio
composability
pubcrawl
Resiliency
telecommunication security
Receivers
encryption
biblio
Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
network systems security
Topology
Time-independent Hierarchical Attack Representation Model
Time independent security analysis
Servers
security of data
security models
Security analysis
security
Resiliency
pubcrawl
network topology
Dynamic Networks and Security
Metrics
GSM
graphical security models
graphical security model
graph theory
Dynamical Systems
Dynamic Network
Databases
cyber security
composability
Analytical models
biblio
Cyber attacks targeting Android cellphones
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
resilience
mobile attack approaches
Mobile communication
mobile computing
mobile phones
Primary Mobile Hack Builder
primary mobile hack builder software
pubcrawl
radiocommunication
Metrics
Resiliency
Scalability
security of data
smart phones
SMS information
Software
software based radio circuit
conversation eavesdropping
android encryption
Android operated cellphone control
Android smartphone
application based attacks
Application Based Mobile Attackers
Cameras
cellphone camera
computer software
Android (operating system)
Cyber Attacks
encryption
frequency based attacks
Frequency Based Mobile Attackers
GSM
Human behavior
Human Factors
biblio
Implementation and optimization of A5-1 algorithm on coarse-grained reconfigurable cryptographic logic array
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
resource allocation
Microelectronic Security
Noise measurement
performance optimization
pubcrawl
real-time requirements
reconfigurable architectures
resilience
Resiliency
Metrics
resource consumption
resource-based path seeking algorithm
RPS adaptive algorithm
shift registers
stream cipher
telecommunication security
Throughput
voice data encryption
coarse-grained reconfigurable cryptographic logic array
A5-1 algorithm optimization
Algorithm design and analysis
application specific integrated circuits
ASIC
bit rate 162.87 Mbit/s
cellular radio
CGRCA
Ciphers
A5-1
composability
Conferences
Cryptography
field programmable gate arrays
FPGA
frequency 162.87 MHz
GSM
biblio
Optimized Narrow-Band M2M Systems for Massive Cellular IoT Communications
Submitted by grigby1 on Thu, 04/20/2017 - 12:33pm
Internet of Things
slotted-Aloha method
Resiliency
pubcrawl
Metrics
Markov processes
markov chain
machine-to-machine communications
machine-to-machine communication
M2M systems
LTE
Long Term Evolution
3GPP
Indexes
Human behavior
GSM
collaboration
clean-slate technologies
clean slate
cellular radio
cellular IOT communications
battery lifetime
Bandwidth
access protocols
biblio
"Survey on Clean Slate Cellular-IoT Standard Proposals"
Submitted by grigby1 on Tue, 02/21/2017 - 11:52am
Low Power Wide Area
system level evaluation
pubcrawl170103
Protocols
Proposals
Power demand
power aware computing
modulation
LPWA technologies
low power-wide area network technologies
C-IoT
Internet of Things Standards
Internet of Things
GSM
Evaluation of C-IoT
clean slate technology
Clean Slate Proposals
clean slate cellular-IoT standard proposals
cellular Internet of Things
cellular automata
biblio
"Survey on Clean Slate Cellular-IoT Standard Proposals"
Submitted by grigby1 on Tue, 02/21/2017 - 11:49am
Low Power Wide Area
system level evaluation
pubcrawl170103
Protocols
Proposals
Power demand
power aware computing
modulation
LPWA technologies
low power-wide area network technologies
C-IoT
Internet of Things Standards
Internet of Things
GSM
Evaluation of C-IoT
clean slate technology
Clean Slate Proposals
clean slate cellular-IoT standard proposals
cellular Internet of Things
cellular automata
1
2
next ›
last »