Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Node Identification in Wireless Network Based on Convolutional Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
wireless network
Neural Network Security
stochastic gradient descent method
softmax model
principal component analysis
node identification
local feature extraction
convolutional neural networks
convolutional neural network
Ad-Hoc Network
gradient methods
wireless networks
computational complexity
Metrics
learning (artificial intelligence)
Ad hoc networks
deep learning
wireless sensor networks
Resiliency
resilience
policy-based governance
pubcrawl
convolutional neural nets
convolution
feature extraction
collaboration
Training
biblio
Modeling Cloud Based Cyber Physical Systems Based on AADL
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
modeling languages
wireless sensor networks
vehicle
Unified modeling language
UML
Software Architecture
Software
security of data
Resiliency
resilience
quality of service
QoS
pubcrawl
object-oriented methods
object oriented security
Object oriented modeling
AADL
modeling
Metrics
Intelligent Transportation Systems
distributed sensors
distributed sensor networks
Data models
cyber-physical systems
CPS
Computational modeling
composability
cloud-based cyber-physical systems
cloud platforms
Cloud Computing
cloud
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
Physical layer security against cooperative anomaly attack using bivariate data in distributed CRNs
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
Communication system security
wireless technology
wireless sensor networks
wireless communication network
signal detection
Robust distance measure
radio spectrum management
OSI network model
multiple anomaly detection algorithm
mahalanobis distance measure
Eigenvalues and eigenfunctions
eigenvalue-based sensing
distributed spectrum sensing
Cooperative SSDF attacks
cooperative communication
cooperative anomaly attack
sensors
cognitive radio networks
cognitive radio networking
cognitive radio
bivariate data
Anomaly
wireless channels
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
telecommunication security
Wireless communication
Computational modeling
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Enhance Wireless Security System Using Butterfly Network Coding Algorithm
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
IoT system
wireless sensing network
wireless security system
Wi-Fi module
traditional security system
system indicators
Received signal strength indication (RSSI)
received signal strength indication
network transmission
Network node routing
butterfly network coding algorithm
Butterfly network coding (BNC) algorithm
cyber physical systems
telecommunication security
encoding
network coding
Predictive Metrics
security monitoring
wireless LAN
Decoding
RSSI
wireless sensor networks
composability
pubcrawl
Resiliency
Internet of Things (IoT)
biblio
Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme
Submitted by grigby1 on Fri, 04/03/2020 - 12:55pm
cryptographic hash functions
resilience
wireless sensors
sequential aggregate MAC
sequential aggregate authentication
provable security
Ma-Tsudik FssAgg MAC scheme
Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme
forward security
Cryptography
Cryptographic Hash Function
access protocols
Compositionality
Metrics
wireless sensor networks
Resiliency
pubcrawl
biblio
Security in Wireless Sensor Networks: A formal verification of protocols
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
WSN technology
wireless sensor networks
telecommunication security
Security Properties
security breaches
Security analysis
security
secure transmissions
safe transmissions
real-time communications
pubcrawl
protocol verification
analyzed protocols
policy-based governance
Policy Based Governance
industrial domains
formal verification
Cryptographic Protocols
concerns security aspects
concerns improved guarantees
Compositionality
composability
complex networked control systems
collaboration
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 11:42am
quantum computers
wireless sensor networks
Wireless Sensor network communication
ubiquitous internetworking
tiny sensor nodes
telecommunication security
stage permeated filtering mechanism
security of data
Scalability
resource-aware security
Resiliency
quantum cryptography
quantum computing security
quantum computing
Pervasive Computing Security
pubcrawl
Predictive Metrics
lightweight quantum-safe security concept
Intrusion Detection Systems
internetworking
Internet of Things
filtering theory
distributed sensor nodes
contemporary cryptographic mechanisms
Computers
composability
Ciphers
Base stations
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
…
next ›
last »