Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensors
biblio
Enhanced Simulation Framework for Realisation of Mobility in 6LoWPAN Wireless Sensor Networks
Submitted by aekwall on Mon, 01/13/2020 - 12:04pm
6LoWPAN
shortest routes
personal area networks
mobility management (mobile radio)
Mobility
Handover
enhanced simulation framework
6LoWPAN wireless sensor networks
QoS
sensors
quality of service
security improvement
IoT
telecommunication network routing
simulation
wireless sensor networks
composability
pubcrawl
Resiliency
Protocols
performance evaluation
Internet of Things
computer network security
file
Sensor Network-based Lower-Limb Prosthesis Optimization and Control
Submitted by Douglas Murphy on Fri, 01/10/2020 - 4:37pm. Contributors:
Ou Bai
Douglas Murphy
Ashraf Gorgey
Ding-Yu Fei
Zhixiu Han
Health CPS
sensors
robotics
Prosthesis
adaptive control
fusion
Posters
1552163
CPS PI Meeting 2020
2020
NSF
U.S. Government
Poster
biblio
Secure Kalman Filter State Estimation by Partially Homomorphic Encryption
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
secure estimation
Kalman filters
key system information
modified decryption algorithm
multiplicative homomorphic encryption scheme
normal Kalman filtering
partially homomorphic encryption
power system
quantization
IEEE 9-bus power system
secure Kalman filter state estimation
secure multiparty computation methods
SEKF
state estimates
system parameters
system state
trustworthy situation awareness
Scalability
Communication Network
associated communication channels
Homomorphic encryption
state estimation
Human Factors
sensors
Smart Grids
Metrics
pubcrawl
Resiliency
cyber-physical systems
security
data privacy
encryption
Cryptography
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
financial markets theory
wireless sensor networks
Trusted Computing
trust diversification
Trajectory
telecommunication computing
spatially autocorrelated candidate sensors
sensors
sensor data accuracy trustworthiness
pubcrawl
Portfolios
online data cleaning
online context-aware data cleaning method
MWSN
Mobile wireless sensor networks
mobile radio
Control Theory
DTP
diversified trust portfolio
Decision Making
data imprecision
data handling
Correlation
context-aware
Conferences
Computing Theory and Trust
Compositionality
composability
cleaning
beta-trust
security
biblio
Mitigating Physical Layer Attack in Cognitive Radio - A New Approach
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pubcrawl
Zadoff-Chu sequence
wireless channels
telecommunication security
spectrum sensing
sensors
Resiliency
resilience
replay attack
radio spectrum management
radio frequency spectrum
PUEA
authentication
primary user emulation attack
physical layer attack mitigation
Physical layer
OFDM
emulation
distance calculation
Correlation
Communication channels
Cognitive Radio Security
cognitive radio
biblio
Primary User Authentication in Cognitive Radio Network Using Pre-Generated Hash Digest
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
pregenerated hash digest
telecommunication security
sensors
Resiliency
resilience
radio networks
PUEA
pubcrawl
primary user emulation attack
primary user authentication
authentication
node authentication
emulation
Cryptography
CRN
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
Base stations
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
The Detection of the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
unlicensed cognitive devices
telecommunication security
spectrum sensing data falsification attack
spectrum scarcity challenges
spectrum observations
spectrum band
signal detection
sensors
Resiliency
resilience
q-out-of-m rule scheme
Ad hoc networks
performance evaluation
modified Z-test
Licenced users
fading channels
Decision Making
Copper
Cognitive Radios
cognitive radio technology
Cognitive Radio Security
cognitive radio ad hoc networks
cognitive radio
biblio
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless network systems
underutilized spectrum
telecommunication security
spectrum congestion
spectrum bands
signal detection
sensors
security measure
security
Resiliency
resilience
radio spectrums
radio spectrum management
Radio spectrum
Ad hoc networks
network leading interference
legitimate cognitive radios
Interference
data communications
cooperative communication
Consensus algorithm
Cognitive Radio Security
cognitive radio ad-hoc networks
cognitive radio
Cascading style sheets
byzantine attack mitigation scheme
byzantine attack
attack-proof cooperative spectrum sensing
biblio
Analogous Study of Security Threats in Cognitive Radio
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless sensor networks
wireless security threat issue
Wireless communication
white space
telecommunication security
SSDF
spectrum sensing data falsification
signal detection
sensors
sensor fusion
security
Resiliency
resilience
radio spectrum management
PUE
cognitive radio
Primary user Emulation
Jamming
Interference
Fusion Techniques
fusion technique
electromagnetic spectrum band
Electromagnetic spectrum
Data integration
CRWSN
Cooperative Spectrum Sensing and Spectrum Sensing Data Falsification (SSDF)
cooperative spectrum sensing
cooperative communication
cognitive radio wireless sensor networks
Cognitive Radio Security
Cognitive Radio (CR)
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »