Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
modular coding scheme
Software-defined radio
Downlink
Human Factors
codes
URLLC
wiretap channel
physical layer security
3GPP
5G
information theoretic security
collaboration
encoding
delays
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Some Discussions on PHY Security in DF Relay
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
probability
secrecy performance analysis
Decode-and-forward
Human Factors
Computer simulation
power system reliability
Physical layer
physical layer security
information theoretic security
Performance analysis
Compositionality
collaboration
military communication
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
authentication
Broadcast Authentication
authentication codes
Galois fields
Human Factors
codes
information theoretic security
Compositionality
Receivers
composability
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
On the Security Properties of Combinatorial All-or-nothing Transforms
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
Entropy
weak security
conditional entropy
combinatorial all-or-nothing transform
Human Factors
Transforms
perfect security
Probability distribution
information theoretic security
Upper bound
Compositionality
composability
collaboration
Cryptography
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
information security
biblio
Compliance Checking Based Detection of Insider Threat in Industrial Control System of Power Utilities
Submitted by grigby1 on Fri, 08/25/2023 - 2:43pm
Industries
remote charge control
compliance check
business process component
Resiliency
power system reliability
Electrical Engineering
Policy Based Governance
control systems
process control
integrated circuits
insider threat
industrial control system
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
security
biblio
An Analysis of Insider Attack Detection Using Machine Learning Algorithms
Submitted by grigby1 on Fri, 08/25/2023 - 2:41pm
policy-based governance
Resiliency
classification
Measurement
Policy Based Governance
computer security
Wireless communication
Data models
security
resilience
insider threat
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning algorithms
machine learning
Predictive models
biblio
An Exploratory Study of Security Data Analysis Method for Insider Threat Prevention
Submitted by grigby1 on Fri, 08/25/2023 - 2:40pm
insider threat
security
Insider Threats
pubcrawl
Human behavior
Human Factors
Metrics
policy-based governance
resilience
information and communication technology
convergence
Policy Based Governance
data analysis
Resiliency
Data Analysis Method
Security Data Analysis
biblio
Enhancing an Information-Centric Network of Things at the Internet Edge with Trust-Based Access Control
Submitted by grigby1 on Fri, 08/25/2023 - 10:00am
Data models
networking
information-centric networking
security management
ICN
trust
quality of service
Information Centric Networks
Urban areas
computer architecture
Scalability
Software
Resiliency
resilience
pubcrawl
IoT
security
Internet of Things
biblio
Survey on MAC Protocol of Mobile Ad hoc Network for Tactical Data Link System
Submitted by grigby1 on Fri, 08/25/2023 - 10:00am
security
pubcrawl
resilience
Resiliency
Scalability
information technology
Information Centric Networks
Reliability
mobile ad hoc networks
Technological innovation
Media Access Protocol
System performance
MAC protocol
mobile ad hoc network (MANET)
Network Centric Warfare
Tactical Data Link
biblio
3CL-Net: A Four-in-One Networking Paradigm for 6G System
Submitted by grigby1 on Fri, 08/25/2023 - 9:59am
computer architecture
security
pubcrawl
resilience
Resiliency
Scalability
Wireless communication
Prototypes
Information Centric Networks
information-centric networking
6G mobile communication
ubiquitous computing
3CL-Net
3CL-Net based prototype
6G system
networking paradigm
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »