Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
5G mobile communication
biblio
Evolving AL-FEC Application Towards 5G NGMN
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
mobile multicast services
arbitrary packet losses
deterministic algorithms
error control
error protection schemes
FEC error control method
feedback free error recovery method
fifth generation mobile technology
forward error correction codes
Application Layer FEC codes
mobile multicast standards
mobile users
multicast communication
Multimedia communication
next generation mobilenetwork
online algorithms
randomized online algorithms
redundant data
source data
pubcrawl
composability
Metrics
Decoding
5G mobile communication
ultra-high reliability
next generation networks
encoding
Resiliency
telecommunication network reliability
forward error correction
Packet loss
5G Next Generation Mobile Networks
5G NGMN
AL-FEC policy online problem
AL-FEC protection
biblio
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks
Submitted by grigby1 on Fri, 06/12/2020 - 11:22am
Metrics
Synthetic Data
SON algorithm
SON
Service requirements
self organizing 5G networks
Scalability
Resiliency
resilience
realistic synthetic data
pubcrawl
neural nets
ML
5G
machine learning
learning (artificial intelligence)
interconnected deep artificial neural networks
generative adversarial networks
generative adversarial network
Generative Adversarial Learning
deep learning
data analysis
CDRs
call data records
5G mobile communication
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies
biblio
Performance Measurements of Network Service Deployment on a Federated and Orchestrated Virtualisation Platform for 5G Experimentation
Submitted by aekwall on Mon, 06/01/2020 - 9:48am
network functions virtualization
virtualisation experiments
virtualisation
software defined networking
Servers
security
SDN experiments
Resiliency
resilience
pubcrawl
policy-based governance
orchestration
NFV experiments
network service deployment
network service
5G experimentation
network function virtualization
multiple component testbeds
Monitoring
middleware security
middleware platform
middleware
Measurement
KPI
Europe
EU SoftFIRE project
computer architecture
composability
5G mobile communication
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
biblio
Dynamically Reconfigurable Slice Allocation and Admission Control within 5G Wireless Networks
Submitted by grigby1 on Fri, 04/03/2020 - 11:19am
Radio Access Network
integrated user application-specific demand characteristics
intra-slice resource sharing elasticity
massive machine type communication
network characteristics evaluation
network load
network utility
online slice allocation model
quality of experience
heterogeneous traffic demand
resource allocation decision metric
resource allocation framework performance
resource management
service demand
slice resource block-size
ultra-reliable low-latency communication
predictive security metrics
Internet of Things
estimation theory
enhanced mobile broadband
Dynamic scheduling
dynamic intra-slice decision boundary estimation model
Bandwidth
admission control strategy
Admission control
5G wireless network
resource allocation
Metrics
telecommunication congestion control
telecommunication traffic
quality of service
5G mobile communication
pubcrawl
biblio
Multi-Operator Orchestration of Connectivity Services Exploiting Stateful BRPC and BGP-LS in the 5GEx Sandbox
Submitted by grigby1 on Fri, 03/27/2020 - 10:37am
connectivity services
wide area networks
virtualisation
stateful BRPC
segment routing
Routing protocols
QoS-based connectivity
optical fibre networks
optical domains
Multioperator orchestration
multioperator multitechnology transport network
free-space optical communication
European 5GEx Sandbox
collaboration
BGP-LS
backward recursive PCE-based computation
5GEx multidomain orchestrator
sandboxing
delays
Routing
composability
Topology
quality of service
5G mobile communication
policy-based governance
pubcrawl
biblio
Solving Cybersecurity Problem by Symmetric Dual-Space Formulation—Physical and Cybernetic
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
symmetric dual-space
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Wireless communication
symmetric Maxwell Equation
symmetric dual-system
symmetric dual-space formulation
security of data
Maxwell equations
Maxwell Equation
Fourier transforms
Fourier transform
electronic warfare
Electromagnetics
cybersecurity problem
Broadband antennas
5G mobile communication
5G mobile
Cybersecurity
computer security
Scalability
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »