Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless networks
biblio
A Secure and Power-Efficient Constellations for Physical Layer Security
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
communication security
wireless networks
wireless channels
symmetrical constellations
symbol error rate performance
SER performance
power-efficient constellations
power-efficiency
polarization modulation
Monte Carlo simulation
Monte Carlo methods
double-layer constellations
double layers constellations
telecommunication security
8
4
16-order double-layer constellations
physical layer security
error statistics
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
passive attacks
wiretap attacks
wiretap attack
wireless networks
wired networks
weak security
secure network coding system architecture
Routing
Resiliency
resilience
Receivers
random network coding system
random codes
pubcrawl
communication confidentiality
network performance metrics
network links
network coding
Metrics
Hash functions
encoding
eavesdropper
deterministic network coding system
cyber security
cyber physical systems
Cryptography
composability
biblio
A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs)
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
specific routing roles
flat logical overlay
hierarchical MANETs
hierarchical mobile ad hoc networks
Hierarchical Networks
hierarchical underlay
mobility scenarios
OMNET++
specific performance challenges
dynamic topology changes
Structured Overlay
tactical networks
topology-awareness
underlay mismatch
underlay topology
wireless networks
peer to peer security
telecommunication network topology
Resiliency
pubcrawl
p2p
Peer-to-peer computing
Metrics
telecommunication network routing
MANET
mobile ad hoc networks
telecommunication security
Scalability
Human Factors
mobile devices
DHT
dedicated servers
deployment
deployment solution
biblio
When Analog Meets Digital: Source-Encoded Physical-Layer Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Relays
wireless networks
TWRC PLNC
two-hop node coordination
Topology
Throughput
telecommunication traffic
spread spectrum communication
Source-Encoded PLNC scheme
Source-Encoded Physical-Layer Network Coding
source coding
SE-PLNC
Resiliency
Ad hoc networks
relay networks (telecommunication)
pubcrawl
Predictive Metrics
physical-level network coding
network topology
network coding
multipath relaying opportunities
multihop wireless networks
cyber physical systems
composability
channel coding
ad-hoc networks
biblio
Scalable QAM Modulation for Physical Layer Security of Wireless Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:33am
wireless networks
Scalable Security
wireless channel
scalable quadrature modulation
scalable QAM
quadrature amplitude modulation
QAM modulation
OFDM
Internet of Things concept
FFT
connected devices
cryptographic algorithms
IoT
wireless channels
Scalability
energy consumption
physical layer security
Data protection
pubcrawl
IoT applications
IoT devices
Internet of Things
computer network security
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
security threats
Wireless Network Security
wireless device transmitters
transient signals
radio transmitters
Radio Frequency Fingerprints
radio frequency fingerprint extraction
radio fingerprinting
physical characteristics
fractional fourier transform
Fourier transforms
identity authentication
wireless networks
sensor security
authorisation
Signal to noise ratio
Transient analysis
Metrics
wireless devices
Communication system security
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
feature extraction
security
telecommunication security
biblio
Faster-Than-Nyquist Signaling for Physical Layer Security on Wireless Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
physical layer security
wireless smart grid
wireless network segment
faster-than-Nyquist signaling
faster-than-Nyquist
coding
artificial noise
signal processing
encoding
wireless networks
information protection
signal processing security
security of data
power engineering computing
smart grid security
security mechanisms
smart power grids
privacy
Metrics
composability
pubcrawl
Resiliency
information security
biblio
Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network
Submitted by grigby1 on Tue, 01/21/2020 - 12:10pm
Metrics
Zigbee
wireless networks
timeslot allocation method
timeslot allocation
secure join
resource management
resource limitation problem
Resiliency
resilience
radio networks
pubcrawl
policy-based governance
multiple node join mechanism
collaboration
Mesh networks
IPv6-based industrial wireless network
ipv6 security
IPv6
IP networks
internet
industrial wireless network
IEEE 802.15.4e network
IEEE 802.15 Standard
Cryptography
computer network security
composability
biblio
Linear Precoding Design for Cache-aided Full-duplex Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
linear beamforming zero-forcing
edge node
FD mode
full-duplex
full-duplex transmission
future generation wireless networks
half-duplex counterpart
inner approximation method
Interference cancellation
iterative optimization algorithms
least mean squares methods
edge caching
linear codes
linear precoding design
minimum mean square error designs
optimization problems
precoding
radiofrequency interference
self-interference
spectral efficiency
zero trust
wireless networks
Resiliency
pubcrawl
policy-based governance
Iterative methods
optimization
array signal processing
radio networks
Human Factors
wireless channels
network coding
Scalability
approximation theory
cache storage
cache-aided FD system
cache-aided full-duplex networks
concave programming
data hungry
delivery time
delivery time analysis
delivery time optimization
biblio
ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 12:06pm
local repair attacks
bagged trees
boosted trees
classifier validation methods
ELNIDS
Ensemble Learning
ensemble learning based network intrusion detection system
global connectivity
heterogeneous smart devices
IPv6 Routing Protocol
lossy networks
NIDS
RPL based Internet of Things
RPL-NIDDS17 dataset
RUSBoosted trees
smart devices
subspace discriminant method
RPL
intrusion detection model
wireless networks
classification
routing attacks
Intrusion Detection
6LoWPAN
Vegetation
Routing
Routing protocols
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Internet of Things
security of data
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »