Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Energy Efficiency
biblio
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Submitted by grigby1 on Thu, 01/28/2021 - 12:33pm
pubcrawl
wireless transmission
Temperature measurement
Software algorithms
Software
smart phones
Scalability
RSA
Resiliency
resilience
android encryption
Metrics
Human behavior
Energy Efficiency
encryption
Diffie-Hellman algorithm
Cybersecurity
computer security
Complexity theory
asymmetric encryption/decryption algorithm
biblio
Design Considerations for Low Power Internet Protocols
Submitted by aekwall on Mon, 12/21/2020 - 12:29pm
interoperability
small maximum transfer unit
low-power wireless networks
low power Internet protocols
IPv6 connectivity
design considerations
code size
Resiliency
telecommunication network planning
IEEE 802.15 Standard
personal area networks
telecommunication network reliability
IoT
Bluetooth
embedded systems
Energy Efficiency
6LoWPAN
internet
energy conservation
composability
pubcrawl
power aware computing
Protocols
IP networks
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT-IIoT networks
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
iiot
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
sensors
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
IoT
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
biblio
Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
UAVs
value-added services
standardisation
standard gap analysis
solid technical foundation
security-critical data
security-critical
regulatory foundation
quality living
optimised management
mobile IoT devices
Gap Analysis
data-driven systems
Data Protection and Privacy
Unmanned Aerial Vehicles
data privacy
autonomous aerial vehicles
interoperability
trustworthiness
Energy Efficiency
Data protection
standards
composability
pubcrawl
Trusted Computing
Protocols
privacy-sensitive data
security
Internet of Things
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 10:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
Fog Radio Access Networks in Internet of Battlefield Things (IoBT) and Load Balancing Technology
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
load balancing technology
Fog Radio Access networks
Human Factors
Industrial Internet of Things (IIoT)
Industrial IoT
Internet of Things
Internet of Things knowledge
iobt
IoT devices
joint distributed computing
load balancing strategy
Fog Radio Access Network
Load management
local computing
military communication
mobility management (mobile radio)
network edge
pubcrawl
radio access networks
resource allocation
Scalability
ultra low latency
delays
bandwidth efficiency
battlefield efficiency
battlefield Things
C-RAN
Cloud Computing
cloud radio access networks
computer architecture
computing ability
computing capability
content sharing scheme
5G mobile communication
distributed computing
distributed computing load balancing problem
edge computing
Energy Efficiency
F-RAN architecture
F-RAN nodes
fifth generation communication
Fog computing
fog equipment
biblio
Cyber security issues of Internet of electric vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:11am
internet
Servers
sensors
security of data
security
Roads
Resiliency
resilience
pubcrawl
MFemtocell
Metrics
IoEV
Internet of Vehicles
Internet of Things
Internet of electric vehicles
Internet information exhange
5G
Intelligent Transportation Systems
Infrastructure
Human Factors
environmental benefits
Energy Efficiency
energy consumption
energy conservation
electrical vehicle communication
Electric Vehicles
cyber security issues
connected vehicles
Charging stations
battery limit
batteries
biblio
Design of Data Confidential and Reliable Bee Clustering Routing Protocol in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 10:57am
reliable Bee clustering routing protocol
mobile ad hoc network
mobile ad hoc networks
multihop routing
packet forwarding ratio
packet forwarding statistics
pattern clustering
pubcrawl
public key cryptography
received packets
Metrics
reliable data transmission
resilience
Resiliency
Routing
Routing protocols
secure data delivery system
sensors
telecommunication security
wireless sensor networks
ECC
Bee Ad Hoc Clustering
bee clustering approach
Bee-Ad Hoc-C
Black hole attack
clustered based approach
Compositionality
data confidential
data privacy
data reliability
overhearing
Elliptic curve cryptography
Elliptical Curve Cryptography
Energy Efficiency
ensures data confidentiality
forwarded packets
IndexTerms-Mobile Ad Hoc Networks
legion intelligence
MANET
manet privacy
biblio
Lifetime Analysis of Underwater Wireless Networks Concerning Privacy with Energy Harvesting and Compressive Sensing
Submitted by aekwall on Mon, 10/26/2020 - 11:03am
lifetime analysis
underwater acoustic communication
energy harvesting
compressive sensing
civil operations
classical wireless sensor networks
improved network lifetime
integrated limited batteries
invasion detection
lifetime
compressed sensing
listening
mixed integer programming model
novel encryption decision method
silent positioning
underwater life monitoring
underwater sensor nodes
Underwater Wireless Networks
Location Privacy in Wireless Networks
energy conservation
encryption
data privacy
Resiliency
Human behavior
pubcrawl
batteries
wireless sensor networks
privacy
Cryptography
telecommunication power management
Metrics
optimization
Energy Efficiency
military operations
Compositionality
integer programming
UWSN
biblio
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
Submitted by aekwall on Mon, 09/14/2020 - 11:27am
communication
composability
universally composable key bootstrapping
universal composability model
universal composability
strong security notion
session keys
secure key bootstrapping protocol
secure communication protocol
practical key bootstrapping protocol
multiple energy resources
multicast communications
key bootstrapping
ideal functionality
energy internet
security
multicast communication
energy resources
Smart Grids
power engineering computing
Energy Efficiency
smart power grids
internet
Computational modeling
Cryptography
pubcrawl
Protocols
Cryptographic Protocols
telecommunication security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »