Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Propagation losses
biblio
Forward Error Correction Applied to JPEG-XS Codestreams
Submitted by grigby1 on Mon, 07/31/2023 - 4:47pm
pubcrawl
Metrics
resilience
composability
Reed-Solomon codes
Redundancy
forward error correction
Image coding
Propagation losses
Resiliency
Image quality
JPEG-XS
Rate-distortion
Unequal Error Protection
biblio
A Public Key Cryptography based Mechanism for the Secure Transmission of RGB Images using Elliptic Curve based Hill Cipher and Magic Square Concept
Submitted by grigby1 on Fri, 07/14/2023 - 3:17pm
Ciphers
encryption
pubcrawl
Metrics
resilience
Resiliency
performance evaluation
Scalability
Wireless communication
Elliptic curve cryptography
Steganography
Resists
Propagation losses
Hill Cipher Encryption
image security
Magic Square
biblio
Cross-Layer DoS Attack Detection Technique for Internet of Things
Submitted by grigby1 on Tue, 05/30/2023 - 3:17pm
Internet of Things
security
IoT
Intrusion Detection
pubcrawl
resilience
Resiliency
Cross Layer Security
composability
Compositionality
Routing protocols
DoS attack
neural network
Propagation losses
Cross layer design
Cross Layer IDS
biblio
Resilience Analysis of Urban Rail Transit Network Under Large Passenger Flow
Submitted by grigby1 on Fri, 05/12/2023 - 10:17am
software reliability
large passenger flow
cascading process
Rails
Control Theory
Public transportation
Resiliency
Propagation losses
software quality
security
complex network
process control
Scalability
resilience
Human Factors
Human behavior
pubcrawl
biblio
Service Quality Loss-aware Privacy Protection Mechanism in Edge-Cloud IoTs
Submitted by grigby1 on Fri, 08/26/2022 - 1:25pm
privacy protection
Repeated game
localized differential privacy
Incentive mechanism
Control Theory
Propagation losses
crowdsourcing
game theory
Market research
Servers
Games
sensors
privacy
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Operational Security Assessment for Transmission System Adopting Dynamic Line Rating Mechanism
Submitted by aekwall on Fri, 08/26/2022 - 12:16pm
composability
dynamic line rating (DLR)
Dynamical Systems
electrical safety
industrial power systems
operation security assessment
Power system dynamics
power transmission lines
Predictive Metrics
Propagation losses
pubcrawl
Resiliency
Robust optimization
Systems operation
uncertainty
biblio
Secure Real-time Data Access Using Two-Factor Authentication Scheme for the Internet of Drones
Submitted by grigby1 on Mon, 08/01/2022 - 2:45pm
pubcrawl
Human behavior
Human Factors
security
authentication
privacy
internet
real-time systems
Resistance
Propagation losses
two-factor authentication
two factor authentication
Costs
UAVs
Internet of drones
Real-time information
biblio
Security and Reliability Performance Analysis for URLLC With Randomly Distributed Eavesdroppers
Submitted by grigby1 on Fri, 07/01/2022 - 8:30am
coding theory
Ultra-reliable and low-latency communications (URLLC)
security-reliability tradeoff
finite-blocklength information theory
channel training
Ultra reliable low latency communication
Resiliency
Propagation losses
stochastic geometry
security
error probability
reliability theory
Performance analysis
wireless networks
Metrics
Conferences
resilience
pubcrawl
biblio
Hardware Implementation of IP-Enabled Wireless Sensor Network Using 6LoWPAN
Submitted by aekwall on Mon, 11/29/2021 - 1:53pm
Logic gates
Hardware
wireless sensor networks
Packet loss
pubcrawl
Resiliency
composability
IPv6
6LoWPAN
receiving antennas
Propagation losses
transmitting antennas
Xbee
biblio
Lightweight Multi-Factor Authentication for Underwater Wireless Sensor Networks
Submitted by grigby1 on Thu, 09/30/2021 - 11:10am
pubcrawl
wireless sensor networks
Human Factors
malicious attacks
Media Access Protocol
Metrics
multifactor authentication
Multi-factor authentication
Propagation losses
Human behavior
resilience
Resiliency
Routing protocols
scientific computing
security
Terrestrial Wireless Sensor Networks
Underwater Wireless Sensor Networks
Wireless communication
1
2
next ›
last »