Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Asymptotic Analysis of a New Low Complexity Encryption Approach for the Internet of Things, Smart Cities and Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
sensors
party fusion center perspectives
probability
pubcrawl
quantisation (signal)
quantizer
resilience
Resiliency
scalar parameters
secure estimation
sensor networks
sensor outputs
parameter estimation
smart cities
Smart Grid
Smart Grid Sensors
stochastic encryption
telecommunication security
TPFC estimation
vector parameter estimation
wireless medium
wireless sensor networks
WSN
Internet of Things
binary stochastic encryption approach
Compositionality
Cryptography
encrypted nonbinary quantized data
encryption
encryption approaches
fixed threshold binary quantization limits parameter estimation
Human behavior
Human Factors
information security
asymptotic analysis
legitimate fusion center
LFC estimation
low complexity encryption
low complexity encryption approach
maximum likelihood estimation
maximum-likelihood estimation
mean square error methods
nonbinary generalized case
nonbinary quantized observations
optimal estimators
biblio
Research on the Node Information Security of WSN Based on Multi-Party Data Fusion Algorithm
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
Routing
WSN
wireless sensor networks
Wireless Sensor Network
Wireless communication
urban power industry
telecommunication security
telecommunication network topology
telecommunication network reliability
smart power grids
smart power grid
Smart Grids
Smart Grid Sensors
sensor fusion
routing security
Routing protocols
Big Data
Resiliency
resilience
pubcrawl
power system security
power system reliability
plane routing protocol
node information security
network topology
multiparty data fusion algorithm
Human Factors
Human behavior
data fusion technology
Compositionality
clustering routing protocol
cluster routing protocol
biblio
A Low Power Cybersecurity Mechanism for WSNs in a Smart Grid Environment
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
smart grid environment
phasor measurement
Phasor measurement units
power consumption
power system security
pubcrawl
Receivers
resilience
Resiliency
security of data
sensor devices
smart grid cybersecurity
North American Electric Reliability Corporation
smart grid monitoring application
Smart Grid Sensors
Smart Grids
smart power grids
Substations
Throughput
wireless sensor networks
WSN cybersecurity mechanism
WSN security mechanisms
WSNs
Denial-of-Sleep Attack
CIP-002 standards
CIP-009 standards
communication functionalities
Compositionality
computer security
critical infrastructure protection standards
critical power grid infrastructure
Cybersecurity
cybersecurity requirements
delay
CIP
Distributed Sensing
Human behavior
Human Factors
low power consumption
low power cybersecurity mechanism
MAC layer
Monitoring
NERC
NERC CIP requirements
NERC CIP standards
biblio
Toward a Sensor Trustworthiness Measure for Grid-Connected IoT-Enabled Smart Cities
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
situational awareness
pubcrawl
resilience
Resiliency
security
Security Metrics
security of data
sensor trustworthiness measure
sensor verification
power systems
smart cities
Smart Grid Sensors
Smart Grids
smart power grids
Trusted Computing
trustworthy power generation
wireless sensor networks
Human behavior
bulk power systems
Compositionality
critical infrastructures
cyber physical systems
cyber-physical modeling
cyber-physical systems
grid-connected IoT-enabled smart cities
Hardware
Analytical models
Human Factors
Internet of Things
large-scale critical infrastructure systems security
malevolent IoT devices
Perturbation methods
power engineering computing
power system security
biblio
Review of jamming attack using game theory
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
malicious attack nodes
WSN
wireless sensor networks
Wireless Sensor Network
wireless networks
timing channel
telecommunication security
security threats
security
Scalability
pubcrawl
power expenditure
network load
Metrics
external attack
jamming technique
jamming detection
jamming attack
Jamming
internal attack
interaction model
information preservation
Human Factors
Games
game theory
game theoretic strategies
game theoretic security
game theoretic representation
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
biblio
Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks
Submitted by grigby1 on Fri, 10/26/2018 - 4:51pm
real-world data
WSN platforms
wireless sensor networks
turbo codes
Topology
telecommunication network topology
Task Analysis
sophisticated communication mechanisms
simple communication protocols
short range multihop topologies
sensor nodes
security
Scalability
Resiliency
composability
pubcrawlBase stations
pubcrawl
Protocols
multihop wireless sensor networks
multihop extended star topologies
Metrics
forward-error correction schemes
forward error correction paradigm
forward error correction
energy resources
energy consumption
Decoding
computational energy resources
biblio
Trust aware node scheduling protocol for target coverage using rough set theory
Submitted by grigby1 on Thu, 08/23/2018 - 11:46am
target coverage
Protocols
pubcrawl
quality of service
resource scarcity
rough set theory
Rough sets
scheduling strategy
sensors
probability
target coverage problem
telecommunication scheduling
trust
trust aware node scheduling protocol
trust values
Wireless Sensor Network
wireless sensor networks
Human behavior
autonomous operation
computer theory
coverage maximization
coverage probability
decision rules
Energy Efficiency
energy efficient coverage protocol
fault tolerance
active nodes
Human Factors
lifetime
Monitoring
network efficiency
network lifetime
node states
optimisation
biblio
Design, control amp;amp; performance analysis of secure you IoT based smart security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
mobile computing
wireless sensor networks
wireless sensor based security system
smart system
Smart security
smart routing
sensors
security
Safety
Radar vision
Radar tracking
radar imaging
pubcrawl
Mobile Technology
capacitive sensing
Mobile Applications
Mobile Application
IoT based smart security system
Internet of Things
internal security
Intelligent sensors
external security
Cryptography
computational intelligence
Compositionality
composability
capacitive sensors
biblio
An energy-efficient wireless image transmission method based on adaptive block compressive sensing and softcast
Submitted by grigby1 on Thu, 08/23/2018 - 11:41am
SoftCast
power allocation
power allocation factors
privacy
pubcrawl
radical evolution
radiocommunication
receiving image qualities
resilience
Resiliency
sampling rate
optimization
SR
staggering rate
telecommunication power management
transmission distortion
visual communication
Wireless communication
wireless image transmission
wireless multimedia communication
wireless sensor networks
energy consumption
adaptive block compressive sensing
Communication system security
composability
compressed sensing
compression distortion
compressive sampling
cyber-physical systems
data compression
distortion
energy conservation
ABCS-SoftCast
energy-distortion model
energy-efficient wireless image transmission method
energy-efficient wireless image transmission scheme
image block
Image coding
Image communication
information and communication technology
Multimedia communication
optimisation
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »