Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
5G networks
biblio
A Study on Various Intrusion Detection Models for Network Coding Enabled Mobile Small Cells
Submitted by aekwall on Fri, 02/17/2023 - 9:50am
network security
Safe Coding
Small Cells
message authentication codes
Lead
5G networks
network coding
Urban areas
policy-based governance
security
Resiliency
Metrics
pubcrawl
Protocols
Intrusion Detection
5G mobile communication
Human Factors
biblio
Formal Specification and Verification of 5G Authentication and Key Agreement Protocol using mCRL2
Submitted by grigby1 on Fri, 08/26/2022 - 10:24am
Metrics
Process Algebra.
mCRL2 language
formal methods
5G-AKA Protocol
formal verification
Concurrency
algebra
3GPP
5G networks
tools
composability
Protocols
5G mobile communication
authentication
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
Liability-Aware Security Management for 5G
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
proof of transit
Trust models
trust and reputation models
transaction processing
telecommunication computing
security-by-contract
Security SLAs (SSLAs)
security of data
Root cause analysis
Resiliency
resilience
reputation models
Remote Attestation
pubcrawl
5G
orchestration decisions
network slicing
network accountability
multiple entities
Metrics
liability-aware security management
Liability
LASM
inherent distribution
composability
accountability mechanism
5G networks
5G mobile communication
biblio
Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers
Submitted by grigby1 on Tue, 02/16/2021 - 11:45am
key data
network topologies
Software Defined Networks
Byzantine Fault Tolerance
byzantine fault tolerance algorithms
cloud-native software
distributed consensus
distributed consensus algorithms
distributed control plane
distributed controller replicas
dynamic reconfiguration
5G networks
modeling frameworks
modeling reliability
network resilience
network softwarization
Raft
replicated SDN controllers
SDN control plane
security considerations
dynamic networks
composability
security
pubcrawl
Metrics
resilience
Resiliency
Software
telecommunication security
Cloud Computing
software fault tolerance
security of data
control systems
software defined networking
Object oriented modeling
fault tolerance
malicious attacks
software-defined network
Reliability
telecommunication network topology
telecommunication network reliability
biblio
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge Computing
Submitted by grigby1 on Wed, 12/02/2020 - 1:03pm
response latency
Logic gates
mobility management (mobile radio)
next generation automotive edge computing
next generation networks
next-generation intelligent transportation system
Prototypes
pubcrawl
resilience
Resiliency
local edge server
road traffic
Scalability
Servers
synchronisation
telecommunication control
telecommunication traffic
traffic accidents
traffic engineering computing
vehicle dynamics
data traffic
5G mobile communication
5G networks
central cloud-based approach
central server
Cloud Computing
computer architecture
control and user plane separation
coupled congestion control
CUPS
5G
Dynamic mapping
dynamic mapping traffic
edge computing
edge computing architecture
edge servers
global dynamic mapping information
Intelligent Transportation Systems
Internet of Things
IoT
biblio
Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
advanced radio transmission
artificial intelligence security
wireless networks
transmitting antennas
networking techniques
mobile networks
MIMO communication
Intelligence slices
industrial network security
fifth-generation networks
channel prediction
autonomous network management
artificial intelligence technology
AI module
AI algorithms
security
5G networks
network infrastructure
neural network
wireless channels
Task Analysis
resource allocation
Prediction algorithms
telecommunication network management
telecommunication computing
5G mobile communication
telecommunication security
pubcrawl
Artificial Intelligence
biblio
Privacy Preserving Cyberbullying Prevention with AI Methods in 5G Networks
Submitted by grigby1 on Fri, 08/07/2020 - 2:48pm
Scalability
term frequency-inverse document frequency
subscribers benign messages
psychological effects
privacy preserving cyberbullying prevention
operator labels subscribers
online social media
cyberbullying incidents
Cyberbullying Detection
AI methods
5G networks
AI
learning (artificial intelligence)
social networking (online)
telecommunication computing
5G mobile communication
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
biblio
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
parity check codes
LLR-based turbo code
log-likelihood ratio
low-density parity check code
Maximum likelihood decoding
Metrics
MIMO communication
modulation
modulation coding
network coding
numerical analysis
numerical evaluation
LLR-based outer channel coding
physical layer security
polar code
polar code concatenation
polar codes
pubcrawl
resilience
Resiliency
SCAD
secure channel coding effect
sequential LLR
composability
5G networks
bit error rate performance
block codes
C-MIMO transmission scheme
channel coding
chaos
chaos multiple-input multiple-output-based polar concatenation code
chaos transmission
chaotic communication
chaotic MIMO block modulation
5 G
concatenated codes
convolutional code
Convolutional codes
cyber physical systems
Decoding
error correction ability
error correction codes
error statistics
iterative decoding
LDPC-concatenated transmission
1
2
next ›
last »