Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

modeling algorithms

biblio

Visible to the public Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection

Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
  • modeling technique
  • traffic characterization
  • telecommunication traffic
  • telecommunication security
  • RFIDs
  • RFID traffic patterns
  • RFID traffic models
  • RFID traces
  • RFID security
  • RFID
  • Resiliency
  • resilience
  • radiofrequency identification
  • pubcrawl
  • piecewise graphs
  • NFC
  • Adaptation models
  • modeling algorithms
  • Knuth's Rule
  • ISO standards
  • IoT
  • IEC standards
  • Human Factors
  • Human behavior
  • graph theory
  • Computational modeling
  • binned RFID command counts
  • Bayesian Blocks
  • Bayes methods
  • anomaly/intrusion detection
  • Anomaly Detection

Terms of Use  |  ©2023. CPS-VO