Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SNR
biblio
Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
mean square error
World Wide Web
transposition cipher method
text file
text encryption
text encoding
SNR
single to noise ratio
Resiliency
pubcrawl
PSNR
privacy
Predictive Metrics
performance evaluation
peak single to noise
MSE
Cryptography
Information hiding
image visual quality
image retrieval
Image Processing
Image coding
Human behavior
hidden data mechanism
genetic algorithms
genetic algorithm
encryption
DNA encoding
DNA cryptography
DNA coding
DNA
digital media
biblio
Secured Transmission of Data Using Chaos in Wcdma Network
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
multipath channels
additive white gaussian noise channel
AWGN
AWGN and Rayleigh multipath fading channel
binary sequence
binary sequences
chaotic signal transmission
code division multiple access
gold codes
logistic map
Multiaccess communication
BER
PN grouping
QPSK
QPSK modulation techniques
Rayleigh multipath fading channel
spreading code
spreading sequence
W-CDMA framework
Walsh codes
WCDMA
chaotic communication
telecommunication security
Resiliency
pubcrawl
composability
Metrics
channel coding
error statistics
SNR
Downlink
security of data
AWGN channels
network coding
Rayleigh channels
Phase shift keying
data transmission security
Binary codes
spread spectrum communication
fading channels
modulation coding
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
biblio
A Practical, Provably Unbreakable Approach to Physical Layer Security
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
reciprocal channel state
Phase measurement
Phase shift keying
phase shift keying constellation
physical layer security
provably unbreakable approach
PSK constellation points
pubcrawl
Radio frequency
radio frequency propagation path
radiowave propagation
raw key bits
multipath fading
resilience
Resiliency
secure key exchange
SNR
static fading channel
telecommunication security
Time measurement
under-determined system
wireless transmission
zero information leakage
independent channel realization
channel coding
channel perturbation
composability
Cryptography
error statistics
Eves antennas
Eves signal-to-noise ratio
fading channel
fading channels
FEC
forward error correction
antennas
independent realizations
key consolidation
key size
linear equations
masking property
measured reciprocal channel phase
Metrics
mirrors
modulo 2π
multipath channel
biblio
Research on Anomaly Intrusion Detection Technology in Wireless Network
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
Time-frequency Analysis
wireless network intrusion detection
wireless network
traffic statistical analysis model
signal fitting method
network intrusion signal model
matched filters
correlation matching filter
anomaly intrusion detection algorithm
adaptive time-frequency feature decomposition
adaptive correlation spectrum analysis method
signal-to-noise ratio
wireless networks
Intrusion Detection
SNR
statistical analysis
Analytical models
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
feature extraction
network security
Adaptation models
computer network security
biblio
Information Theoretical Secure Key Sharing Protocol for Noiseless Public Constant Parameter Channels without Cryptographic Assumptions
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
matrix algebra
theoretical cryptography
SNR
Signal to noise ratio
Shannon information
Quantization (signal)
pubcrawl
Protocols
protocol restrictions
private key cryptography
privacy amplification procedure
Privacy Amplification
privacy
physical layer security
noiseless public constant parameter channels
artificial noise
key sharing protocol
internet
information theoretical secure key sharing protocol
Eigenvalues and eigenfunctions
eigenvalues
eavesdropper channels
Cryptography
Cryptographic Protocols
cryptographic assumptions
constant parameter noiseless public channel
computer network security
Compositionality
composability
Bit error rate
biblio
A System Design of Real-Time Narrowband Rfi Detection And Mitigation for Gnss-R Receiver
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
resilience
mitigation
NF
Passband
pubcrawl
radio detection
radio receivers
radiofrequency interference
real-time narrowband radiofrequency interference detection
real-time narrowband radiofrequency interference mitigation
real-time NB RFI detection
real-time NB RFI mitigation
Receivers
Metrics
Resiliency
RFI
satellite navigation
signal-to-noise ratio
SNR
system analysis and design
system design
threat mitigation
white narrowband interference
Wireless communication
WNBI
FPGA
band-stop filters
cascading IIR band-stop filters
cGNSS-R
continuous wave interference
conventional GNSS-R
CWI
DDM
delay-Doppler map
detection
field programmable gate arrays
fixed-point implementation
Band-pass filters
Global navigation satellite system
Global Navigation Satellite Systems-reflectometry
GNSS-R
Human behavior
Human Factors
iGNSS-R
IIR BSF
IIR filters
IIR notch filter
interference suppression
interferometric GNSS-R receivers
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms
biblio
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
CMOS integrated circuits
sensor security
time 19.7 ms
tamper-resistant enclosures
SNR
size 350.0 nm
sensor fusion
Semiconductor device measurement
physical interaction
physical attacks
noise figure 94.6 dB
integrated circuits
integrated circuit packaging
Electrodes
electrode matrix
CMOS technology
security
Capacitors
capacitive touch technology
capacitive sensors
capacitive multichannel security sensor IC
capacitance measurement
capacitance 460.0 aF
capacitance 35.0 aF
Capacitance
Metrics
composability
pubcrawl
Human behavior
Resiliency
embedded devices