Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
A Scalable Correlation Clustering strategy in Location Privacy for Wireless Sensor Networks against a Universal Adversary
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
correlation methods
Location Privacy in Wireless Networks
wireless network sensors
universal adversary
scalable correlation clustering strategy
remote Environment
adversary
information privacy
telecommunication network planning
Compositionality
Semantics
energy consumption
scalable
telecommunication security
sensors
trust
Correlation
Metrics
sensor placement
privacy
location privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
security
biblio
Preserve Location Privacy for Cyber-Physical Systems with Addresses Hashing at Data Link Layer
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Wireless communication
Location Privacy in Wireless Networks
stronger privacy protection
power efficiency
media access control
data link layer frame
cyber-physical system
Compositionality
Payloads
wireless medium
sensors
Metrics
Cryptography
Routing
privacy
location privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
cyber-physical systems
telecommunication security
Receivers
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Submitted by aekwall on Mon, 10/19/2020 - 11:46am
cutting-edge technologies
Internet of Vehicles
cyber physical systems
technological advancements
cyber-physical impact
automobile scenario
automotive
automotive ecosystem
CIoV
cloud-based artificial intelligence
Cognitive Internet of Vehicles
communication field
vehicles
industrial revolution
industrial revolution 4.0
Intelligent Transportation System
Intelligent Transportation System concept
layer abstractions
local network
prime security
smart decision
technological evolution
ubiquitous 5G mobile network
Transportation
Cloud Computing
data privacy
security
computer architecture
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
internet
Data processing
security of data
sensors
layered architecture
edge computing
next generation networks
Human Factors
security issues
security requirements
Artificial Intelligence
ubiquitous computing
privacy issues
biblio
Quick and Accurate False Data Detection in Mobile Crowd Sensing
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
MCS
wireless sensor networks
SVD
Sparse matrices
Smartphones
singular value decomposition
sensors
sensor fusion
Roads
Resiliency
resilience
pubcrawl
Monitoring
mobile crowd sensing
mobile computing
approximation theory
Matrix Separation
Matrix decomposition
Matrix converters
low-rank matrix approximation
LightLRFMS
light weight low rank and false matrix separation algorithm
Iterative methods
iteration process
Human behavior
False Data Detection
DRMF
direct robust matrix factorization
cyber physical systems
composability
biblio
SDN\_Based Secure Healthcare Monitoring System(SDN-SHMS)
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
Biomedical monitoring
Expert Systems and Privacy
security platform
security integration framework
secure Healthcare Monitoring System
SDN-SHMS
IoT-based remote health monitoring systems
IoT-based healthcare monitoring systems
HMS
geriatrics
elderly people
security concern
biomedical communication
privacy concern
patient monitoring
medical computing
Monitoring
Software Defined Network
health care
Human Factors
sensors
Mobile Applications
pubcrawl
Human behavior
software defined networking
computer architecture
security
Internet of Things
Medical services
data privacy
Scalability
biblio
Design and Evaluation of Jamming Resilient Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:12pm
telecommunication network reliability
Protocols
pubcrawl
random jamming
random strategy
resilience
Resiliency
resource-aware event-triggered control schemes
retrofit ageing
security
sensors
system design challenge
protocol aware strategy
telecommunication security
test-bed results
time-triggered control schemes
water network test-bed
water networks
wireless actuators
Wireless communication
wireless sensor networks
Wireless Sensor/Actuator Networks
wireless sensors
entire CPS failure
aware jamming
classic time-triggered control scheme
constant jamming
constant strategy
control systems
CPS resilience
cyber physical systems
cyber-attacks
cyber-physical systems
design approach
access protocols
event-triggered control
event-triggered control scheme
Jamming
jamming attacks
jamming resilient cyber-physical systems
jamming strategies
large scale infrastructures
next generation cyber-physical systems
physical process
physical processes
biblio
Resilience Enhancement through a Multi-agent Approach over Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
IPv6 test-bed
ubiquitous computing
tangible physical world
sensors
Resiliency
resilience enhancement
resilience
pubcrawl
physical disturbances
multiagent framework
multiagent approach
multi-agent systems
Monitoring
middleware
actuators
IP networks
information technology
information technologies
distributed devices
cyber-physical systems
cyber vulnerabilities
cyber space perspective
cyber physical systems
CPS resilience
control systems
computer architecture
communication platforms
biblio
Mission Resilience for Future Army Tactical Networks
Submitted by grigby1 on Tue, 10/06/2020 - 2:10pm
Mission critical systems
Weapons
traditional engineering methods
Task Analysis
tactical network architectures
tactical network
tactical forces
Streaming media
sensors
Resiliency
resilience
pubcrawl
psychometric
network architecture
mission resilience metrics
mission essential functions
autonomous vehicles
Mission Assurance
mission
military operations
military communication
Measurement
future army tactical networks
cyber-physical systems
cyber resilience metrics
cyber physical systems
Cyber Physical System
cyber assets
CPS resilience
command and control systems
battlefield operations
biblio
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
provably-correct distributed state estimation algorithm
trusted nodes
Trusted Computing
state estimation
set theory
sensors
security
Scalability
Robustness
resilient distributed state estimation
Resiliency
resilience
Redundancy
pubcrawl
attack-prone environment
NP-hard
Measurement
LTI systems
Linear systems
linear dynamical process
Human Factors
Heuristic algorithms
computer theory
computer network security
computational complexity
communication-link augmentation
attack-resilient algorithm
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »