Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network coding
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Study on Security Technology of Internet of Things Based on Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
network coding
traditional network technology
Satellites
prefect information secure condition
max-flow
information secure network coding scheme
information network
eavesdropping adversaries
cyber physical systems
computer network security
encoding
Predictive Metrics
information technology
composability
pubcrawl
Resiliency
security
Internet of Things
biblio
Enhance Wireless Security System Using Butterfly Network Coding Algorithm
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
IoT system
wireless sensing network
wireless security system
Wi-Fi module
traditional security system
system indicators
Received signal strength indication (RSSI)
received signal strength indication
network transmission
Network node routing
butterfly network coding algorithm
Butterfly network coding (BNC) algorithm
cyber physical systems
telecommunication security
encoding
network coding
Predictive Metrics
security monitoring
wireless LAN
Decoding
RSSI
wireless sensor networks
composability
pubcrawl
Resiliency
Internet of Things (IoT)
biblio
Network Coding for Critical Infrastructure Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
Predictive Metrics
store-and-forward paradigm
programmable networks
programmable data-planes
P4 ecosystem
linear network coding
linear NC functions
intermediate network
Critical Infrastructure Networks
atomic coding primitives
network topology
cyber physical systems
linear codes
network coding
encoding
telecommunication security
Payloads
software defined networking
telecommunication network topology
computer network
computer networks
delays
resilience
Decoding
composability
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
biblio
Improving Resiliency of Software-Defined Networks with Network Coding-Based Multipath Routing
Submitted by grigby1 on Wed, 02/26/2020 - 4:47pm
integer-programming optimization
network coding
pubcrawl
resilience
Resiliency
Routing
Software-Defined Networks
biblio
Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network reliability
sensor security
selective forwarding attacks
selective forwarding attack
security attacks
security
Routing protocols
Routing
robust recovery schemes
Resiliency
reliable transmission scheme
cluster head
Protocols
Predictive Metrics
network coding
Metrics
malicious security attacks
low energy adaptive clustering hierarchy
LEACH protocol
Human behavior
encoding
diversity coding
delays
cyber physical systems
composability
cluster routing protocols
biblio
Enabling Linearly Homomorphic Signatures in Network Coding-Based Named Data Networking
Submitted by grigby1 on Tue, 01/21/2020 - 11:50am
exponentiation
linearly homomorphic signature
named data networking
network coding
pubcrawl
resilience
Resiliency
Scalability
biblio
Linear Precoding Design for Cache-aided Full-duplex Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
linear beamforming zero-forcing
edge node
FD mode
full-duplex
full-duplex transmission
future generation wireless networks
half-duplex counterpart
inner approximation method
Interference cancellation
iterative optimization algorithms
least mean squares methods
edge caching
linear codes
linear precoding design
minimum mean square error designs
optimization problems
precoding
radiofrequency interference
self-interference
spectral efficiency
zero trust
wireless networks
Resiliency
pubcrawl
policy-based governance
Iterative methods
optimization
array signal processing
radio networks
Human Factors
wireless channels
network coding
Scalability
approximation theory
cache storage
cache-aided FD system
cache-aided full-duplex networks
concave programming
data hungry
delivery time
delivery time analysis
delivery time optimization
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »