Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless networks
biblio
Affect-preserving privacy protection of video
Submitted by grigby1 on Wed, 03/08/2017 - 2:12pm
pubcrawl170113
wireless networks
Visual privacy protection
video signal processing
video applications
Three-dimensional displays
social sciences computing
social behaviors
Skin
Skeleton
shape deformation
Shape
security of data
security
affect-preserving privacy protection
privacy
mobile computing
mobile cameras
linear blend skinning
Image color analysis
health information
facial expression
face recognition
face image editing
Face
entertainment
data privacy
biblio
Many-to-all priority-based network-coding broadcast in wireless multihop networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
priority-based deadlock prevention
wireless networks
wireless multihop networks
Wireless communication
Vectors
trees (mathematics)
Topology
telecommunication network topology
System recovery
radio networks
Protocols
broadcast
packet transmission
network coding
minimum transmission broadcast problem
maximum out-degree problem
many-to-all- with-network-coding MTB problem
Energy Efficiency
encoding
distributed many-to-all priority-based network-coding broadcast protocol
broadcast trees
biblio
Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
MAC Spoofing attacks
wireless networks
Wireless Network Security
Wireless communication
telecommunication security
spoofing attack detection
received signal strength
radio networks
Monitoring
MD5 hashing
Accuracy
Hardware
EPAM clustering
enhanced partitioning around medoid
Electronic mail
dynamic MAC address allocation
Cryptography
Broadcasting
Attacks Detection and Prevention
biblio
Confidentiality-Preserving Control of Uplink Cellular Wireless Networks Using Hybrid ARQ
Submitted by BrandonB on Tue, 05/05/2015 - 10:29am
Automatic repeat request
Base stations
Cross-layer optimization
Decoding
Heuristic algorithms
hybrid automatic repeat request (ARQ)
Mutual information
physical-layer security
Uplink
wireless networks
biblio
OSAP: Optimal-cluster-based source anonymity protocol in delay-sensitive wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:47pm
network traffic
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
source anonymity
security
real event report latency
Protocols
OSAP
optimal cluster based source anonymity protocol
network traffic reduction
Base stations
mobile computing
Mobile communication
global attacker
fake packet injection
event source location privacy
event source anonymity
delays
delay sensitive wireless sensor networks
data privacy
cluster-based wireless sensor network
challenging attack model
biblio
Content and network-aware multicast over wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
network coding
wireless networks
wireless mesh networks
video multicast service
video multicast application
Video communication
telecommunication network reliability
Streaming media
redundancy allocation algorithm
Redundancy
Receivers
network-aware multicast communication
network node allocation
Bandwidth
multicast communication
high priority video packet delivery
error prone wireless mesh network
end-to-end performance
delays
data multicast application
data communication
content-aware multicast communication
content and network-aware redundancy allocation
channel status
channel coding
channel bandwidth
biblio
Secret key generation in correlated multi-dimensional Gaussian channels
Submitted by BrandonB on Fri, 05/01/2015 - 8:35am
secret key generation
wireless networks
Wireless communication
wireless channels
wireless channel reciprocity
wide-sense stationary wireless channels
Time-frequency Analysis
time-domain analysis
time selectivity
time domains
telecommunication security
spatial domains
spatial correlation
signal-to-noise ratio
Signal to noise ratio
security
analytical framework
radio networks
public key cryptography
public channel
multiple antenna eavesdroppers
intrinsic secrecy content
Gaussian channels
frequency-domain analysis
frequency domains
Covariance matrices
correlated multidimensional Gaussian channels
confidential communications
Communication system security
asymptotic analysis
antenna arrays
biblio
Scaling laws for secrecy capacity in cooperative wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:33am
path loss exponent
Wyner randomized encoder
wireless networks
Transmitters
Tin
telecommunication security
serial block Markov scheme
secure communication
secrecy capacity
scaling laws
Relays
relay networks (telecommunication)
active cooperative relaying
parallel relaying scheme
Markov processes
interference limited communications
interference (signal)
encoding
cooperative wireless networks
cooperative communication
beamforming
array signal processing
Aggregates
biblio
Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:54pm
re-route detection
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
telecommunication network routing
telecommunication channels
security
Routing
redundant nodes
redundant node
all-channel analyzer
Protocols
Monitoring
intrusion tolerance mechanisms
intrusion tolerance architecture
intrusion tolerance
Intrusion Detection
expert intrusion detection analysis system
data traffic detection
data communication
biblio
Defending Against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:33pm
Frequency-based attack
secure distrbuted data storage
wireless networks
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »