Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
energy harvesting
biblio
Lifetime Analysis of Underwater Wireless Networks Concerning Privacy with Energy Harvesting and Compressive Sensing
Submitted by aekwall on Mon, 10/26/2020 - 12:03pm
lifetime analysis
underwater acoustic communication
energy harvesting
compressive sensing
civil operations
classical wireless sensor networks
improved network lifetime
integrated limited batteries
invasion detection
lifetime
compressed sensing
listening
mixed integer programming model
novel encryption decision method
silent positioning
underwater life monitoring
underwater sensor nodes
Underwater Wireless Networks
Location Privacy in Wireless Networks
energy conservation
encryption
data privacy
Resiliency
Human behavior
pubcrawl
batteries
wireless sensor networks
privacy
Cryptography
telecommunication power management
Metrics
optimization
Energy Efficiency
military operations
Compositionality
integer programming
UWSN
biblio
On Security Capability of Cooperative Communications in Energy Scavenging Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
relay networks (telecommunication)
Cognitive Radio Security
precise closed-form formula
power division
noncognitive networks
message recovering time
Manganese
ESCRNs
energy scavenging time
energy scavenging cognitive radio networks
energy scavenging
cooperative communications
SOP
secrecy outage
security
secrecy outage probability
cognitive radio
energy harvesting
Interference
Relays
cooperative communication
telecommunication network reliability
telecommunication power management
Analytical models
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Security Analysis for Cognitive Radio Network with Energy Scavenging Capable Relay over Nakagami-m Fading Channels
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
Cognitive Radio Network
Cognitive Radio Security
underlay cognitive network
SOP
secrecy outage
relay networks (telecommunication)
power constraints
Nakagami-m fading channels
Nakagami-m
energy scavenging capable relay
energy scavenging
closed-form expression
secrecy outage probability
relaying
Nakagami channels
security
cognitive radio
information processing
energy harvesting
Relays
fading channels
telecommunication network reliability
probability
Decoding
Security analysis
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
Resiliency
Mathematical model
Metrics
power grids
power system security
precise monitoring
production site
pubcrawl
renewable energy sources
renewable sources
resilience
HVDC power transmission
sensor node
simulation
simulations
specific environment
Substations
Temperature sensors
thermoelectric conversion
thermoelectrical generator
wireless sensor networks
wireless sensor nodes
electrical vehicles
batteries
composability
computational fluid dynamics
computational fluid dynamics model converter
Conductivity
converter
converter station
course means
CPS modeling
Electric Vehicles
autarkic energy supply
electricity
energy harvesting
environmental factors
Europe
fossil fuels
Generators
green electrical power
Grid Security
high voltage direct current technology
HVDC power convertors
biblio
Trust is the Cure to Distributed Consensus with Adversaries
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
resilience
Iterative methods
Nonvolatile memory
optimisation
policy-based governance
Policy-Governed Secure Collaboration
Power supplies
Program processors
pubcrawl
Hardware
Resiliency
Scalability
social engineering networked systems
Task Analysis
trust evaluation mechanism
trust graph model
trust propagation scheme
trust-aware consensus algorithm
decision theory
composability
Computer Theory and Trust
access protocols
Byzantine adversary detection
computer science
consensus iteration process
Decision Making
decision making problem
Compositionality
distributed consensus algorithm
distributed consensus problems
distributed optimization
economic engineering networked systems
energy harvesting
false trust
graph theory
biblio
Research on Physical Layer Security of Cooperative Networks Based on Swipt
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
energy harvesting
time allocation parameter
system security outage probability
SWIPT
source node
simultaneous wireless information and power transfer
relay nodes
relay networks (telecommunication)
radiofrequency power transmission
radio signals
radio receivers
radio networks
physical layer security performance
information long-distance transmission
energy-constrained nodes service life
computer network security
eavesdropping users
destination nodes
cooperative networks
Cooperative Network
cooperative communication
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
probability
power engineering computing
computer network reliability
biblio
Physical Layer Security of an Amplify-and-Forward Energy Harvesting-Based Mixed RF/UOW System
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
optical fiber communication
fixed-gain amplification
legitimate destination node
malicious eavesdropper
maximal ratio combining
mixed RF-UOWC system
mixture Exponential-Gamma fading
MRC
multiantenna AF relay device
Nakagami channels
Nakagami-m fading
fading channels
optical links
radio-frequency system
relay node
RF link
S-R hop
secrecy outage probability
single-antenna source node
underwater optical wireless communication
UOWC link
Underwater Networks
error statistics
telecommunication security
Radio frequency
Resiliency
pubcrawl
batteries
wireless sensor networks
telecommunication power management
Metrics
Signal to noise ratio
probability
Scalability
antenna arrays
physical layer security
Relays
relay networks (telecommunication)
telecommunication network reliability
amplify and forward communication
amplify-and-forward energy harvesting
diversity reception
dual-hop system
energy harvesting
biblio
Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
resource management
primary user
PU
pubcrawl
radiofrequency signal emission
radio networks
radio receivers
radio reception
radio transmitters
receiver
Receivers
Resiliency
resource allocation
power splitting ratio
RF signal emission
secondary user
secure resource allocation
security
signal processing
SU
subcarrier allocation
telecommunication security
transmitter
untrusted secondary user
untrusted secondary users
Jamming
cognitive radio
Cognitive Radio Security
colocated orthogonally dual-polarized antenna
communication security
cooperative cognitive radio networks
cooperative communication
CRN
EH
electromagnetic wave polarisation
energy harvesting
frequency division multiple access
antennas
jamming signals
minimum secrecy rate requirement
numerical analyses
numerical analysis
ODPA
OFDMA
OFDM modulation
orthogonally dual-polarized antennas (ODPAs)
physical-layer security
polarization-based signal processing technique
polarization-enabled green cooperative cognitive radio network
file
Self-Sustainable Cyber-Physical Spaces through Distributed Micro-Scale Energy Harvesting
Submitted by Eli on Mon, 02/17/2014 - 4:43pm. Contributors:
Eli Bozorgzadeh
Nalini Venkatasubramanian
CPS Domains
Energy
CPS Technologies
Foundations
embedded systems
energy harvesting
micro-scale
middleware
CFP Paper Submissions
CFP Submissions
2013 National Workshop on Energy Cyber-Physical Systems
2013
Academia
Position Paper
Publications
« first
‹ previous
1
2