Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless sensor networks
biblio
Localization in 3-D by Using Magnetic-Induction Communications in Near-Field
Submitted by el_wehby on Tue, 05/15/2018 - 1:20pm
access protocols
Localization in Wireless sensor networks
Magnetic Induction
multi coil Magneto-Inductive Communications
wireless sensor networks
1646548
biblio
Formal Modeling and Verification of a Wireless Body Area Network (WBAN) Protocol: S-TDMA Protocol
Submitted by grigby1 on Wed, 05/09/2018 - 2:47pm
time division multiple access
resilience
Resiliency
S-TDMA protocol
Scalability
scalable verification
TDMA
TDMA bus arbitration
temporal aspect modeling
real-time model checker
timed automata
WBAN
Wearable devices
wireless body area network protocol
Wireless communication
wireless sensor networks
WSN
access protocols
pubcrawl
model checking
Metrics
Medium Access Control
Media Access Protocol
MAC protocols
MAC protocol
information processing systems
implanted devices
formal verification
formal validation
Connectors
Compositionality
body sensor networks
body area networks
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
History Trust Routing Algorithm to Improve Efficiency and Security in Wireless Sensor Network
Submitted by grigby1 on Wed, 04/11/2018 - 3:02pm
security
wireless sensor networks
Wireless Sensor Network
Wireless communication
Trusted Computing
Trust Routing
trust path routing algorithm
telecommunication security
telecommunication network routing
technological limit
Stability analysis
source node
sink node
composability
secure route
Scalability
routing trust history table
routing path
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
history trust routing algorithm
History
biblio
A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN
Submitted by grigby1 on Wed, 04/11/2018 - 2:54pm
sensor nodes
resilience
Resiliency
Routing
routing algorithms
Routing protocols
Scalability
secure environmental monitoring system
security
pubcrawl
telecommunication power management
telecommunication security
Time Frequency Analysis
time latency
Wireless communication
wireless sensor area
wireless sensor networks
WSN routing
hybrid routing algorithm
bio inspired algorithms
Channel measurement
Clustering algorithms
cyber physical systems
Data Transmission
environmental monitoring (geophysics)
firefly algorithm
Fireflyalgorithm
Algorithm design and analysis
LAL users
Localizability aided localization routing protocol
metaheuristic hybrid algorithm
Metrics
network lifetime
packet drop
Packet loss
Protocol frequency
biblio
Determination of the Eb/N0 ratio and calculation of the probability of an error in the digital communication channel of the IP-video surveillance system
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
pubcrawl
wireless sensor networks
wireless LANs
Wireless communication
video surveillance
Signal noise ratio(S/N)
Scalability
Resiliency
Quality of channel
Bit error rate
protocol of data exchange
Human behavior
error probability
Digital video channel
digital communication
Communication system security
Cameras
biblio
Real-time localization of mobile targets using abnormal wireless signals
Submitted by K_Hooper on Wed, 04/04/2018 - 9:52am
pubcrawl
wireless sensor networks
Wireless communication
Underwater Networks
target tracking
signal processing
Scalability
Resiliency
real-time systems
real-time localization
abnormal wireless signals
multiwireless signals
mobile targets
Mobile communication
Metrics
Mathematical model
GPS signals
Global Positioning System
Communication system security
biblio
A secure localization algorithm based on reputation against wormhole attack in UWSNS
Submitted by K_Hooper on Wed, 04/04/2018 - 9:51am
secure localization algorithm
wormhole attack
wireless sensor networks
UWSNs-RDV-HOP
UWSNs
Underwater Wireless Sensor Networks
Underwater Networks
telecommunication security
Signal processing algorithms
signal processing
security
secure scheme
Acoustics
Scalability
Resiliency
reputation values
pubcrawl
propagation distance
Metrics
Mathematical model
marine communication
inconsistent propagation delays
DV-hop
anchor nodes
biblio
On modeling of eavesdropping behavior in underwater acoustic sensor networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:51am
security
wireless sensor networks
Wind speed
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater acoustic communication
underwater acoustic channel characteristics
underwater
telecommunication security
spreading factor
Sonar equipment
simulation
Signal to noise ratio
acoustic communication
Scalability
Resiliency
pubcrawl
probability
Metrics
isotropic hydrophones
hydrophones
eavesdropping probability
eavesdropping
Computational modeling
array hydrophones
acoustic signal frequency
biblio
Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
resilience
wireless sensor networks
wireless protocols
Wireless communication
wearables security
Wearable devices
vulnerability assessment method
smartphone
smart phones
security of data
security
Scalability
Resiliency
Biomedical monitoring
pubcrawl
Protocols
privacy
Internet-connected devices
Internet of Things (IoT)
Internet of Things
Human behavior
Cybersecurity
body area networks
bluetooth low energy
Bluetooth
« first
‹ previous
…
32
33
34
35
36
37
38
39
40
…
next ›
last »