Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
telecommunication network routing
Location Privacy in Wireless Networks
tactically positioned agent nodes
source location privacy
random routing techniques
random routing
Phantoms
agent node routing
agent node
adversary
Position measurement
source node
WSN
Compositionality
Safety
Metrics
sensor placement
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
Monitoring
biblio
Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:53am
Routing protocols
Location Privacy in Wireless Networks
source location privacy
resource-constrained sensor nodes
location privacy protection
Global Adversary
context privacy
Position measurement
WSN
Compositionality
computer science
Monitoring
network traffic
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data privacy
biblio
An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural Network
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
Internet of Vehicle
wireless sensor networks
vehicular ad hoc networks
telecommunication traffic
security issues
Resiliency
pubcrawl
packet header analysis
network attacks
Metrics
low-powered embedded vehicle terminal
Kernel
Intrusion Detection System (IDS)
Intrusion Detection
Internet of Vehicles intrusion detection system
Internet of Vehicles
automobiles
internet
information security
IDS
Human Factors
Human behavior
feature extraction
cyber physical systems
Cryptography
convolutional neural networks
convolutional neural network (CNN)
convolutional neural network
convolutional neural nets
convolution
computer network security
car network
biblio
Quick and Accurate False Data Detection in Mobile Crowd Sensing
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
MCS
wireless sensor networks
SVD
Sparse matrices
Smartphones
singular value decomposition
sensors
sensor fusion
Roads
Resiliency
resilience
pubcrawl
Monitoring
mobile crowd sensing
mobile computing
approximation theory
Matrix Separation
Matrix decomposition
Matrix converters
low-rank matrix approximation
LightLRFMS
light weight low rank and false matrix separation algorithm
Iterative methods
iteration process
Human behavior
False Data Detection
DRMF
direct robust matrix factorization
cyber physical systems
composability
biblio
Design and Evaluation of Jamming Resilient Cyber-Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:12pm
telecommunication network reliability
Protocols
pubcrawl
random jamming
random strategy
resilience
Resiliency
resource-aware event-triggered control schemes
retrofit ageing
security
sensors
system design challenge
protocol aware strategy
telecommunication security
test-bed results
time-triggered control schemes
water network test-bed
water networks
wireless actuators
Wireless communication
wireless sensor networks
Wireless Sensor/Actuator Networks
wireless sensors
entire CPS failure
aware jamming
classic time-triggered control scheme
constant jamming
constant strategy
control systems
CPS resilience
cyber physical systems
cyber-attacks
cyber-physical systems
design approach
access protocols
event-triggered control
event-triggered control scheme
Jamming
jamming attacks
jamming resilient cyber-physical systems
jamming strategies
large scale infrastructures
next generation cyber-physical systems
physical process
physical processes
biblio
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
CPS infrastructure
middleware
sensors
Human Factors
Data Analytics
mobile devices
CPS
Wireless Sensor Network
WSN
cyber physical systems
communication infrastructure
computerized integration connectivity
cyber world
CPS middleware
Cyber Physical system architecture
energy efficient protocols
Machine Communication
man-made physical world
Mobile Sensor Information Agent
MSIA
quality of services
SDN-based CPS
software related mobile sensing paradigm
CPS Privacy
wireless sensor networks
Monitoring
Cloud Computing
Internet of Things
security
Protocols
Software
mobile computing
computer architecture
software defined networking
Human behavior
pubcrawl
computer network security
energy conservation
telecommunication power management
Decision Making
privacy
software-defined networking
mobile radio
cyber-physical systems
SDN
smart decision making
quality of service
biblio
Cooperative Key Generation for Data Dissemination in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
Protocols
wireless sensor networks
wireless security
wireless fading channel
Wireless communication
wireless channels
telecommunication security
shared randomness
sensory data
secret key generation protocol
secret bit mismatch
real-time data dissemination
radio channels
quantized fading channel randomness
Quantization (signal)
pubcrawl
2-hop wireless sensor network testbed
privacy
Human Factors
Human behavior
fading channels
Experimental Evaluation
data dissemination
cyber-physical systems
cyber physical systems
Cryptographic Protocols
CPS Privacy
CPS
confidentiality
Communication system security
communication security
biblio
Performance Analysis of Cluster based Secured Key Management Schemes in WSN
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
large scale networks
wireless sensor networks
transmitted information
telecommunication network management
symmetric sets
security of data
security holes
secure transmission
secure information transmission
secure clusters
Routing
Resiliency
pubcrawl
privacy
mystery keys
asymmetric key sets
key management schemes
key management framework
Key Management and Secure Transmission
information security
information records
encoded data
cyber-physical systems
Cryptography
confinement
composability
clustering
cluster-based wireless sensor networks
CBWSN
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
MIMO communication
Cross Layer Security
wireless networks on-board aircraft
WAICs technology
system design complexity
standard technologies
secure wireless avionics intra-communications
radioaltimeters
physical cross-layer security design
multiple-input multiple-output systems
Medium Access Control
MAC-PRY cross-layer design
internal aeronautics bus technologies
composability
aircraft communication
telecommunication security
wireless technology
Aircraft
access protocols
radiofrequency interference
avionics
Aerospace electronics
Wireless communication
Communication system security
wireless sensor networks
pubcrawl
Resiliency
computer architecture
security
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »