Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
5G mobile communication
biblio
An Acoustic Resonator with Electromechanical Coupling of 16% and Low TCF at 5.4 GHz
Submitted by aekwall on Mon, 11/29/2021 - 1:58pm
Silicon compounds
Wi-Fi
Temperature dependence
Low TCF
electromechanical coupling
Acoustics
acoustic resonators
5G NR
acoustic coupling
5G mobile communication
Lithium niobate
Resonant frequency
Human behavior
Resiliency
Scalability
pubcrawl
Couplings
biblio
LSTM-based radiography for anomaly detection in softwarized infrastructures
Submitted by aekwall on Wed, 07/07/2021 - 5:10pm
pubcrawl
visualization
virtualization privacy
Virtualization
Telephone sets
security
SDN
Resiliency
Radiography
5G mobile communication
privacy
orchestration
NFV
Metrics
machine learning
Human behavior
composability
Anomaly Detection
biblio
A Trust-Based Security Scheme for 5G UAV Communication Systems
Submitted by grigby1 on Thu, 06/24/2021 - 10:51am
computer architecture
Unmanned Aerial Vehicles (UAVs)
Unmanned Aerial Vehicles
trust evaluation
simulation
security
resilience
Reliability
pubcrawl
policy-based governance
false trust
Pervasive Computing Security
composability
Communication Systems
Autonomic Security
5G mobile communication
5G communication
Metrics
Human Factors
Scalability
Resiliency
biblio
The Anomaly Detection Mechanism Using Extreme Learning Machine for Service Function Chaining
Submitted by grigby1 on Tue, 03/30/2021 - 11:54am
ICS Anomaly Detection
service integrity
service function chaining
Scalability
Resiliency
resilience
pubcrawl
Neurons
network function virtualization
5G mobile communication
Extreme learning machines
extreme learning machine
Containers
cloud-native
Cloud Computing
Anomaly Detection
5g network
biblio
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
hyper-connected society
automotive security-risk analysis
automotive vehicles
car-hacking studies
car-hacking techniques
common-vulnerabilities- exposure system
cyber kill chain-based cyberattack analysis method
electronic control devices
formal vulnerability-analysis system
automotive industry
ICT environment
information security techniques
mechanical devices
security risk analysis
systematic security-risk-assessment
vehicle-related cyberattacks
vulnerability-information-sharing architecture
Chained Attacks
Computer crime
resilience
Resiliency
automobiles
Automotive engineering
Autonomous Driving
Scalability
5G mobile communication
Industries
pubcrawl
risk analysis
information sharing
traffic engineering computing
Cyber Kill Chain
automotive cybersecurity
Ransomware
5g network
automotive CVE
biblio
Evaluation of Network Assisted Handoffs in Heterogeneous Networks
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
pubcrawl
Metrics
mobile computing
mobility management (mobile radio)
multihoming
named-object
network assisted handoffs
ORBIT testbed
policy-based approach
LTE
Rebinding
resilience
Resiliency
seamless data transfer
soft handoff
Throughput
WiFi
hard handoff
5G mobile communication
beyond 5G networks
clean slate
collaboration
computer architecture
Distributed Mobility Management
DMM
Handover
5G
heterogeneous networks
Human behavior
ICN
information centric network architecture
internet
IP network
IP networks
biblio
Secure Resource Allocation for Polarization-Based Non-Linear Energy Harvesting Over 5G Cooperative Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:05pm
cooperative cognitive radio networks
Cognitive Radio Security
transmitting antennas
size-limited secondary users
secure resource allocation
primary user
polarization-based nonlinear energy harvesting
orthogonally dual-polarized antennas
nonlinear EH model
non-linear energy harvesting
Green wireless networks and communications
energy harvesting based 5G cooperative cognitive radio networks
EH circuits
efficient resource allocation scheme
dual-polarized antennas
telecommunication security
cognitive radio
inductive power transmission
energy harvesting
radio spectrum management
Integrated circuit modeling
Numerical models
cooperative communication
radio networks
5G mobile communication
resource allocation
resource management
pubcrawl
Resiliency
Radio frequency
biblio
Sparse Code Multiple Access based Cooperative Spectrum Sensing in 5G Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 11:57am
Log-MPA detector
fading channels
NOMA
cooperative spectrum sensing
AWGN channel
5G cognitive radio networks
cognitive feature spectrum sensing
fifth-generation network demands
future 5G networks
cognitive radio
Log-MPA iterative receiver based log-likelihood ratio soft test statistic
Non Orthogonal Multiple Access (NOMA)
Rayleigh fading channel
SCMA
sparse code multiple access scheme
spectrum efficiency
Wald-hypothesis test
radio networks
Resiliency
pubcrawl
composability
Metrics
testing
Signal to noise ratio
channel coding
5G mobile communication
Detectors
statistical testing
sensors
multi-access systems
cooperative communication
AWGN channels
Rayleigh channels
radio spectrum management
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Spectrum sharing
network services
Pervasive networking
policy-based governance
pubcrawl
QoS profiles
quality of service
resilience
Resiliency
Scalability
security
service lifecycle automation
multioperator 5G networks
telecommunication network management
telecommunication security
truly production-level stage
trust architecture
trust orchestration mechanisms
ubiquitous computing
Zero Touch Automation
zero trust
zero-touch automation
zero-touch security
computer architecture
Metrics
5G
5G initial visions
5G mobile communication
5G network solutions
AI-driven operations
Artificial Intelligence
automated end-to-end network operations
automation
cognitive network orchestration
Pervasive Computing Security
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
Europe
highly pervasive network
Human Factors
minimal manual interventions
mobile computing
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
telecommunication network reliability
Small Cells
small cell technology
reliable communication
Pollution
next generation communication technologies
network coding environment
malicious user identification scheme
fifth generation of communication networks
device to device communication
dense network coding
next generation networks
Microprocessors
5G
network coding
cooperative communication
computer architecture
Communication networks
wireless network
Protocols
composability
cellular radio
5G mobile communication
telecommunication security
Throughput
Resiliency
resilience
Metrics
pubcrawl
Peer-to-peer computing
security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »