Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Position measurement
biblio
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
Compositionality
Location Privacy in Wireless Networks
tree-based algorithm
source location privacy routing schemes
SLP routing schemes
routing scheme algorithms
routing algorithms
representative schemes
privacy protection level
network lifetime performance
lowest network lifetime
highest influence
angle-based algorithm
source location privacy
Phantoms
Position measurement
data privacy
energy consumption
network lifetime
telecommunication network routing
Mathematical model
trees (mathematics)
Metrics
Computational modeling
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
biblio
Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Metrics
Location Privacy in Wireless Networks
source-location privacy
dynamic mix-ring
Position measurement
Wireless communications
WSNs
routing algorithm
Compositionality
Heuristic algorithms
statistical analysis
Monitoring
Routing
privacy
wireless sensor networks
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
biblio
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
telecommunication network routing
Location Privacy in Wireless Networks
tactically positioned agent nodes
source location privacy
random routing techniques
random routing
Phantoms
agent node routing
agent node
adversary
Position measurement
source node
WSN
Compositionality
Safety
Metrics
sensor placement
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
Monitoring
biblio
Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:53am
Routing protocols
Location Privacy in Wireless Networks
source location privacy
resource-constrained sensor nodes
location privacy protection
Global Adversary
context privacy
Position measurement
WSN
Compositionality
computer science
Monitoring
network traffic
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Compressive Sampling Stepped Frequency Ground Penetrating Radar Using Group Sparsity and Markov Chain Sparsity Model
Submitted by aekwall on Mon, 09/14/2020 - 12:30pm
Ground penetrating radar
stepped frequency radar
sparse image
sparse delays
random frequencies
random antenna positions
radar resolution
radar imaging
radar data
radar antennas
Position measurement
Markov chain sparsity model
Markov Chain model
land mine detection
group sparsity
Group Sparse
Frequency measurement
compressive sampling stepped frequency ground penetrating radar
buried object detection
B-scan
Antenna measurements
A-scan
compressive sampling
markov chain
compressed sensing
Markov processes
privacy
composability
pubcrawl
Resiliency
cyber-physical systems
biblio
Acoustical Analysis of Coupled Rooms Applied to the Deutsche Oper Berlin
Submitted by grigby1 on Wed, 01/16/2019 - 2:28pm
ray tracing
FEM
finite element analysis
Iron
mirror source method
numerical simulation
orchestra members
orchestra pit
Position measurement
Deutsche Oper Berlin
Reverberation
room acoustic quantities
sound pressure level
sound propagation
stage performers
Time measurement
wave-based finite element method
acoustical analysis
Human behavior
Resiliency
Scalability
acoustic coupling
acoustic applications
Acoustic measurements
acoustic propagation
acoustic wave propagation
pubcrawl
Acoustics
architectural acoustics
auditorium
BEM
boundary element method
boundary-elements methods
complex rooms
biblio
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Transportation Systems
Spectrogram
speech processing
Sybil attack
Sybil attack detection method
sybil attacks
testing
Time series analysis
traffic engineering computing
RSSI time series
V2I communications
V2V communications
VANET
vehicle-to-infrastructure communications
vehicle-to-vehicle communications
vehicular ad hoc networks
vehicular speech
Voiceprint
pubcrawl
computer network security
Dynamic Time Warping
Intelligent Transportation Systems
Metrics
mobile computing
Peer-to-peer computing
position estimation
Position measurement
composability
Radio propagation
radio propagation models
Received signal strength indicator
Receivers
Resiliency
road safety
RSSI
biblio
On Protecting Location Secrecy
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
LSM
wireless localization network
Wireless communication
telecommunication security
Scalability
Resiliency
resilience
pubcrawl
privacy
Position measurement
Particle measurements
mobility management (mobile radio)
Metrics
Adversary Models
location secrecy metric
Location secrecy
location information
localization process
localization
Human behavior
general measurement model
eavesdropper
Communication system security
channel conditions
Atmospheric measurements
Algorithm design and analysis
« first
‹ previous
1
2