Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Reliability
biblio
EAODBT: Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
database outsourcing
token enforced cloud storage
search results provability
Query Auditing
outsourcing computation
Invertible Bloom Filter
Integrity Auditing
information proprietor
efficient auditing for outsourced database
EAODBT
database privacy
database encryption
database administration
cloud service provider
Outsourced Database Integrity
security of data
outsourcing
storage management
security issues
database management systems
Reliability
Databases
Metrics
composability
pubcrawl
Resiliency
security
data privacy
IP networks
Cloud Computing
biblio
On the Investigation of Essential Diversities for Deep Learning Testing Criteria
Submitted by aekwall on Mon, 11/02/2020 - 2:47pm
Measurement
testing criteria
testing
test suites
test diversities
Task Analysis
system robustness
Reliability
pubcrawl
program testing
Neurons
neuron activities
Metrics
metamorphic testing
metrics testing
deep learning
learning (artificial intelligence)
image retrieval
fault diagnosis
fault detection ability
fault detection
essential metrics
essential diversities
erroneous behaviors
defined metrics
deep learning testing criteria
Deep Learning testing
deep learning systems
deep learning models
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Blockchain-Based Internet of Vehicles (IoV): An Efficient Secure Ad Hoc Vehicular Networking Architecture
Submitted by aekwall on Mon, 10/19/2020 - 11:47am
connected vehicles
secured communication
secure ad hoc vehicular networking architecture
distribution cloud
distributed access control system
connected vehicle communication network
blockchain-based Internet of Vehicles
information sharing
network resources
Smart City
cyber physical systems
IoV
Internet of Vehicles
distributed control
telecommunication network reliability
security
Human Factors
blockchain technology
Intelligent sensors
Reliability
blockchain
Metrics
vehicular ad hoc networks
privacy
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
telecommunication traffic
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
research target
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
modern computing
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
Cyber-physical attacks
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
advanced communication technologies
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
biblio
Analysis of Cyber-Physical Security in Electric Smart Grid : Survey and challenges
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
cyber-physical system
power engineering computing
Smart Grids
Human Factors
attack motivation
CPS
Meters
security model
ICT
Smart Grid
communication system
defence
electric smart grid
information and communication technology
privacy issue
security concern
CPS Privacy
Monitoring
cyber physical systems
smart power grids
privacy
cyber-physical security
Reliability
Vulnerability
pubcrawl
Human behavior
cyber-physical systems
SCADA systems
SCADA
security
privacy concerns
data privacy
architecture
biblio
Implementation of Blockchain Based Distributed Web Attack Detection Application
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
firewalls
command injection attacks
Co
web-based attacks
Web servers
Web platforms
web attack detection application
Web attack detection
web application firewalls
Stakeholders
signature based detection method
signature based detection
Cryptography
blockchain based web attack detection model
Reliability
Metrics
smart contracts
composability
internet
Resiliency
resilience
pubcrawl
Distributed databases
blockchain
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 10:15am
evolutionary design approach
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
TCPIP
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
Bandwidth
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
programming
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
biblio
Robust Chaos-Based Information Masking Polar Coding Scheme for Wiretap Channel in Practical Wireless Systems
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
flat-fading Rayleigh channels
polar codes
telecommunication network reliability
Channel models
bit-channels
secure polar coding scheme
legitimate users
polar coding scheme
eavesdropping channel conditions
channel polarization
legitimate channels
realistic channel conditions
reliability performances
robust chaos-based information masking
security performances
transmission conditions
wireless communication systems
telecommunication security
Rayleigh channels
AWGN channels
wireless channels
chaotic communication
encoding
wiretap channel
channel coding
Reliability
Decoding
Metrics
Wireless communication
composability
pubcrawl
Resiliency
security
biblio
Application of Bit Interleaving to Convolutional Codes for Short Packet Transmission
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
communication system
short packets
short packet transmission
radiocommunication
long packet transmission
Interleaver
interleaved codes
industrial wireless communication
High reliability
code coding scheme
bit interleaving structure
bit interleaving coding schemes
bit interleaving channel coding
bit interleaving
modulation coding
Resiliency
Error analysis
Convolutional codes
industrial wireless networks
telecommunication network reliability
error correction
Data Transmission
channel coding
Reliability
Metrics
Wireless communication
simulation
composability
pubcrawl
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »