Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless networks
biblio
Wireless Self-Organizing Wi-Fi and Bluetooth based Network For Internet Of Things
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
Bluetooth
bluetooth security
wireless self-organizing Wi-Fi
wireless LAN
Wi-Fi network
Wi-Fi
transmission channels
telecommunication power management
self-organizing networks
open standards
modems
energy-saving modes
energy conservation
Cyber Physical System
Internet of Things
power consumption
cyber physical systems
Wireless fidelity
Routing
wireless networks
wireless channels
Human behavior
resilience
Resiliency
composability
pubcrawl
Power demand
Switches
biblio
Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques
Submitted by aekwall on Mon, 08/24/2020 - 11:46am
PCI DSS
commercial security scanning
confidential customer payment information
expense management
labor reporting
mitigation techniques
on-premise POS
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS)
cloud-bases POS
penetration attacks
Point of Sale (POS)
point-on-sale vulnerability
POS system
price adjustment
Sale systems
Autonomic Security
testing
Servers
security
Resiliency
pubcrawl
composability
standards
Cybersecurity
Business
security of data
cyber-attacks
Industries
security measures
wireless networks
financial data processing
Human Errors
cash flow
biblio
Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:07pm
advanced radio transmission
artificial intelligence security
wireless networks
transmitting antennas
networking techniques
mobile networks
MIMO communication
Intelligence slices
industrial network security
fifth-generation networks
channel prediction
autonomous network management
artificial intelligence technology
AI module
AI algorithms
security
5G networks
network infrastructure
neural network
wireless channels
Task Analysis
resource allocation
Prediction algorithms
telecommunication network management
telecommunication computing
5G mobile communication
telecommunication security
pubcrawl
Artificial Intelligence
biblio
A Novel Physical Layer Authentication Method with Convolutional Neural Network
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
MIMO-OFDM system security
Artificial Neural Networks
MIMO communication
spoofing attacks
channel authentication
convolutional-neural-network-based approach
hypothesis test based methods
L1 regularization
MIMO-OFDM
OFDM
mini batch scheme
Multi-user
multiple-input multiple-output system
multiuser authentication system
OFDM modulation
orthogonal frequency division multiplexing
physical layer authentication method
radio transmitters
authentication
Resiliency
pubcrawl
policy-based governance
Wireless communication
CNN
convolutional neural nets
convolutional neural network
convolutional neural networks
telecommunication security
physical layer security
convolution
cyber physical systems
authentication accuracy
multi-access systems
wireless networks
channel state information
CSI
profile
Honggang Wang
CPS Domains
CPS Technologies
computer architecture
wireless networks
Mobile Security
wireless sensor neteworks
computer systems
Massachusetts
biblio
Multi-Tier and Multi-Band Heterogeneous Wireless Networks with Black Hole Attacks
Submitted by grigby1 on Thu, 06/04/2020 - 10:48am
Communication system security
composability
cyber physical systems
Employment
Human Factors
immersive systems
Performance analysis
privacy
pubcrawl
resilience
Resiliency
sensors
wireless networks
wireless sensor networks
biblio
Decision Tree based AIS strategy for Intrusion Detection in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
cheat nodes
intrusion detection system
MANET security
wired networks
AIS strategy
artificial immune system
artificial immune system strategy
battlefield communications
Cheat Node
artificial immune systems
critical scenarios
Intrusion Detection strategy
multihop communication
natural disaster
network communications
Pathogens
reduced packet delivery ratio
security strategies
Immune system
telecommunication security
Resiliency
pubcrawl
Decision Tree
batteries
Routing protocols
Routing
Metrics
security of data
Decision trees
MANET
mobile ad hoc networks
fixed infrastructure
security measures
Compositionality
wireless networks
Artificial Intelligence
biblio
Extending Authentication Mechanism to Cooperate with Accountable Address Assignment
Submitted by grigby1 on Fri, 05/22/2020 - 1:13pm
IPv6
wireless networks
user authentication
Source Address Validation Improvement
security problems
SAVI
Resiliency
resilience
pubcrawl
Protocols
privacy
Portals
network accountability
Metrics
message authentication
main identity authentication mechanism
802.1X
IP source addresses
IP networks
IP addresses
internet
effective accountability mechanisms
DHCP request process
computer network security
composability
CAIP
authentication
accounting ability
Accountable IP address assignment
Accountable IP
accountable identity
accountable address assignment
biblio
Research on Anomaly Intrusion Detection Technology in Wireless Network
Submitted by aekwall on Mon, 05/11/2020 - 10:12am
Time-frequency Analysis
wireless network intrusion detection
wireless network
traffic statistical analysis model
signal fitting method
network intrusion signal model
matched filters
correlation matching filter
anomaly intrusion detection algorithm
adaptive time-frequency feature decomposition
adaptive correlation spectrum analysis method
signal-to-noise ratio
wireless networks
Intrusion Detection
SNR
statistical analysis
Analytical models
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
feature extraction
network security
Adaptation models
computer network security
biblio
Node Identification in Wireless Network Based on Convolutional Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:01pm
wireless network
Neural Network Security
stochastic gradient descent method
softmax model
principal component analysis
node identification
local feature extraction
convolutional neural networks
convolutional neural network
Ad-Hoc Network
gradient methods
wireless networks
computational complexity
Metrics
learning (artificial intelligence)
Ad hoc networks
deep learning
wireless sensor networks
Resiliency
resilience
policy-based governance
pubcrawl
convolutional neural nets
convolution
feature extraction
collaboration
Training
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »