Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
The LDPC Code and Rateless Code for Wireless Sensor Network
Submitted by aekwall on Tue, 09/08/2020 - 10:06am
pubcrawl
WSN environment
WSN
wireless sensor networks
Sparse matrices
Resiliency
Rayleigh channels
rayleigh channel
rateless code
Raptor code
channel coding
parity check codes
Metrics
LT code
LDPC code
encoding algorithm
encoding
decoding algorithm
Decoding
composability
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
A Secure Authentication and Key Establishment Scheme for Wearable Devices
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
resilience
wireless sensor networks
Wireless communication
Wireless body area networks
smart-home
smart-healthcare
Servers
sensors
security shortcomings
secure services
secure mutual authentication
secure authentication
Scalability
Resiliency
anonymous messages
pubcrawl
message authentication
Medical services
lightweight mutual authentication
lightweight anonymous user authentication
legitimate users
key establishment scheme
computer network security
body area networks
authorisation
authentication
anonymous messaging
biblio
Hybrid Encryption Algorithm Based on Wireless Sensor Networks
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Compositionality
wireless sensor networks(WSNs)
hybrid encryption algorithm
encryption standard
data compression technology
cipher block
asymmetric/symmetric encryption algorithm
Asymmetric Encryption
elliptic curve encryption
AES
advanced encryption standard
ECC
public key cryptography
data compression
Metrics
wireless sensor networks
pubcrawl
Human behavior
Resiliency
private key cryptography
biblio
CEPHEID: the infrastructure-less indoor localization using lighting fixtures' acoustic frequency fingerprints
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
CEPHEID scheme
Acoustic Fingerprints
self localization
MLP
infrastructure-less indoor localization
indoor positioning experiments
Indoor Positioning
indoor localization scheme
environmental fingerprint
DNN classifier
discrete electronic components
Computer peripherals
CHEPEID
characteristic flickering pattern
Resiliency
ceiling lighting fixtures
indoor radio
lighting
Discrete Fourier transforms
light emitting diodes
DNN
estimation
Cameras
Mathematical model
wireless sensor networks
composability
pubcrawl
Human behavior
biblio
IoT Security in Wireless Devices
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Internet of Things
wireless sensor networks
wireless devices
Wireless communication
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
IoT security
IoT
Internet of Things framework
Communication system security
internet
interconnected devices
Human Factors
Human behavior
encryption
Elliptic curve cryptography
ECC (elliptic curve cryptography)
ECC
Conferences
computer network security
composability
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
Resiliency
Mathematical model
Metrics
power grids
power system security
precise monitoring
production site
pubcrawl
renewable energy sources
renewable sources
resilience
HVDC power transmission
sensor node
simulation
simulations
specific environment
Substations
Temperature sensors
thermoelectric conversion
thermoelectrical generator
wireless sensor networks
wireless sensor nodes
electrical vehicles
batteries
composability
computational fluid dynamics
computational fluid dynamics model converter
Conductivity
converter
converter station
course means
CPS modeling
Electric Vehicles
autarkic energy supply
electricity
energy harvesting
environmental factors
Europe
fossil fuels
Generators
green electrical power
Grid Security
high voltage direct current technology
HVDC power convertors
biblio
Data Conformity Evaluation: A Novel Approach for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
L1-norm
wireless sensor networks
tensors
tensor decomposition
telecommunication network topology
star topology network
security
Scalability
Resiliency
pubcrawl
principal-component-analysis
network topology
Metrics
blind attack detection method
Jamming
Iterative methods
IoT security
IoT networks
Internet of Things
Image edge detection
edge detection
data conformity evaluation
data conformity
computer network security
composability
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »