Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
Wireless Interrogation of High Temperature Surface Acoustic Wave Dynamic Strain Sensor
Submitted by aekwall on Mon, 12/21/2020 - 1:32pm
strain gauges
frequency 288.8 MHz
high temperature surface acoustic wave dynamic strain sensor
high-temperature harsh-environment applications
high-temperature harsh-environment sensor
high-temperature wired commercial strain gauge
monitoring dynamic strain
room temperature
SAWR dynamic strain sensors
sensor connection
sensor stability
Strain
fibre optic sensors
strain measurement
strain sensors
structural engineering
structural health monitoring
temperature 100.0 degC
temperature 1000.0 degC
temperature 400.0 degC
wireless interrogation
wireless sensor operation
wirelessly interrogated SAWRs
surface acoustic wave sensors
Resiliency
Human behavior
pubcrawl
wireless sensor networks
Wireless communication
condition monitoring
sensors
data acquisition
wireless
acoustic wave
surface acoustic wave resonators
Scalability
acoustic coupling
Temperature sensors
temperature 293.0 K to 298.0 K
temperature 25.0 degC
Aerodynamics
Bragg gratings
Condition-based Maintenance
dynamic strain excitation
dynamic strain sensing
dynamic strain sensor
biblio
The Effect of Acoustic-Shell Coupling on Near-End Self-Interference Signal of In-Band Full-Duplex Underwater Acoustic Communication Modem
Submitted by aekwall on Mon, 12/21/2020 - 1:30pm
modems
Scattering
acoustic scattering component
acoustic wave interference
acoustic-shell coupling effect
IBFD UWA communication modem
in-band full-duplex
in-band full-duplex underwater acoustic communication modem technology
interference suppression
OFDM
near-end self-interference signal
self-interference cancellation
SI channel
SI signal reconstruction
underwater acoustic communication modem
underwater acoustic sensor networks
UWA communication modem shell
Scalability
Channel estimation
Underwater acoustics
channel impulse response
underwater acoustic communication
UWSN
self-interference
radiofrequency interference
Interference cancellation
acoustic coupling
wireless channels
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Receivers
biblio
6LoWPAN Protocol Based Infrared Sensor Network Human Target Locating System
Submitted by aekwall on Mon, 12/21/2020 - 1:27pm
Internet of Things
Protocols
pubcrawl
composability
wireless sensor networks
6LoWPAN
sensors
Optical sensors
Sensor Systems
Wireless Sensor Network
Cost function
Resiliency
human target location
infrared sensors
PIR
biblio
Investigation on 6LoWPAN Data Security for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
Data Security
wireless sensor networks
Wireless communication
security
Routing protocols
pubcrawl
IoT security
Internet of Things (IoT)
Internet of Things
ipv6 security
Communication system security
authentication
6LoWPAN
policy-based governance
Metrics
composability
Resiliency
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
Sybil attack detection
radio links
radiofrequency identification
Resiliency
rich multipath features
Robot kinematics
Robot sensing systems
robotic collaboration
ScatterID actively manipulates multipath propagation
single-antenna robot
pubcrawl
Sybil attackers
sybil attacks
telecommunication security
Trajectory
Wireless communication
wireless LAN
wireless medium
wireless networking
wireless sensor networks
fine-grained physical layer signatures
backscatter
batteryless backscatter tags
bulky multiantenna systems
collaboration
collaborative tasks
composability
computer network security
featherlight backscatter tags
fictitious robots
Robot Trust
fundamental trust assumption
lightweight Sybil-resilient multirobot networks
lightweight system
Metrics
miniaturized robots
mobile robots
Multi-robot network
multi-robot systems
multipath manipulation
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
An Efficient and Reliable Routing Protocol Using Bio-Inspired Techniques for Congestion Control in WSN
Submitted by grigby1 on Wed, 12/02/2020 - 1:51pm
network performance
wireless sensor networks
Wireless Sensor Network
telecommunication congestion control
Scalability
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
Packet loss
AODV protocol
network delay
delays
cuckoo search algorithm
coupled congestion control
congestion recognition
congestion problem
congestion free path
Congestion Control
congested resources
bioinspired techniques
artificial bee colony algorithm.
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »