Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless
biblio
Security Considerations in the Internet of Things Protocol Stack
Submitted by aekwall on Fri, 04/01/2022 - 1:06pm
security
Software
Internet of Things
Internet of Things (IoT)
Protocols
real-time systems
Wireless communication
pubcrawl
Resiliency
Compositionality
Transportation
Predictive Metrics
IoT Protocol Stack
Vulnerability
wireless
Scientific Computing Security
biblio
Security architecture for UAV
Submitted by aekwall on Mon, 12/20/2021 - 11:19am
Neural networks
wireless
Wi-Fi
vulnerabilities
threats
statistical analysis
security
Resiliency
pubcrawl
Ad Hoc Network Security
Metrics
Law
cyber-physical systems
computer architecture
Compositionality
attacks
ad-hoc systems
Ad hoc networks
biblio
Architecting a Secure Wireless Interconnect for Multichip Communication: An ML Approach
Submitted by grigby1 on Wed, 09/01/2021 - 1:13pm
Communication system security
computer architecture
Hardware
i-o systems security
Jamming
Media Access Protocol
mm-wave
multichip
NoC
pubcrawl
Scalability
security
wireless
Wireless communication
biblio
A Scalable Mobile Multi-Node Channel Sounder
Submitted by grigby1 on Wed, 05/05/2021 - 11:24am
5G
channel sounding
multi-node
pubcrawl
Scalability
Scalable Security
V2V
wireless
biblio
Approximate Symbolic Explanation for Neural Network Enabled Water-Filling Power Allocation
Submitted by aekwall on Mon, 03/01/2021 - 4:03pm
fading channels
symbolic mapping
slow iterative search
OFDM sub-channels
NN power allocation solution
neural network enabled water-filling power allocation
Meijer G-function
iterative WF threshold search process
direct high-dimensional mapping
channel gain
approximate symbolic explanation
Search Space
OFDM modulation
Transforms
xai
Scalability
approximation theory
wireless
Artificial Neural Networks
telecommunication computing
neural nets
optimization
Iterative methods
Wireless communication
resource management
deep learning
pubcrawl
Resiliency
machine learning
biblio
Wireless Interrogation of High Temperature Surface Acoustic Wave Dynamic Strain Sensor
Submitted by aekwall on Mon, 12/21/2020 - 12:32pm
strain gauges
frequency 288.8 MHz
high temperature surface acoustic wave dynamic strain sensor
high-temperature harsh-environment applications
high-temperature harsh-environment sensor
high-temperature wired commercial strain gauge
monitoring dynamic strain
room temperature
SAWR dynamic strain sensors
sensor connection
sensor stability
Strain
fibre optic sensors
strain measurement
strain sensors
structural engineering
structural health monitoring
temperature 100.0 degC
temperature 1000.0 degC
temperature 400.0 degC
wireless interrogation
wireless sensor operation
wirelessly interrogated SAWRs
surface acoustic wave sensors
Resiliency
Human behavior
pubcrawl
wireless sensor networks
Wireless communication
condition monitoring
sensors
data acquisition
wireless
acoustic wave
surface acoustic wave resonators
Scalability
acoustic coupling
Temperature sensors
temperature 293.0 K to 298.0 K
temperature 25.0 degC
Aerodynamics
Bragg gratings
Condition-based Maintenance
dynamic strain excitation
dynamic strain sensing
dynamic strain sensor
biblio
Software Defined Multi-Path TCP Solution for Mobile Wireless Tactical Networks
Submitted by grigby1 on Wed, 12/02/2020 - 12:54pm
software defined multipath TCP solution
relay networks (telecommunication)
relay points
resilience
Resiliency
satellite communication system
satellite failure
Satellites
Scalability
service interruption
shore nodes
single link failure
single-path model
single-path TCP communication methods
pubcrawl
software defined networking
software-defined networking
source node movements
stable network handovers
tactical networks
TCP connectivity
telecommunication network reliability
transport protocols
Unmanned Aerial Vehicles
wireless
Wireless communication
wireless network technologies
wireless signal outage
mobile wireless heterogeneous networks
Bandwidth
communication interruption
communication model
connectable relay point
control systems
coupled congestion control
frequent network handovers
inherent mobility
Marine vehicles
military communication
military computing
Mininet-WiFi emulation testbed
mobile
autonomous aerial vehicles
mobile wireless tactical networks
mobility management (mobile radio)
Multi-Path TCP
multipath channels
naval battle networks
Naval Battlefield Network communications
naval entities
network connectivity
network handover delay
network stability
noninteractive data
nonnegligible overhead
Protocols
biblio
Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
low power consumption
WMN
wireless mesh networks
Wireless Mesh Network Security
wireless
telecommunication security
security
Resiliency
resilience
pubcrawl
Protocols
mesh support capability
MESH network
ad-hoc networking technologies
Human behavior
cyber physical systems
Cyber Physical System
composability
Communication networks
bluetooth security
Bluetooth low energy mesh network technology
bluetooth low energy
Bluetooth
BLE security protocols
BLE mesh network security mechanisms
BLE
biblio
Wireless Sensor Networks Security: Case study
Submitted by aekwall on Mon, 02/17/2020 - 1:33pm
sensor security
wireless sensor networks security
sensor data detection
Sensor
network physical devices
live monitoring
data exchange
data
Network
power consumption
wireless
Elliptic curve cryptography
Data collection
IoT
secure communication
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
encryption
Cloud Computing
biblio
Ghostbuster: Detecting the Presence of Hidden Eavesdroppers
Submitted by aekwall on Mon, 08/26/2019 - 9:08am
resilience
wireless
security weaknesses
eavesdropper
Metrics
policy-based governance
pubcrawl
Human behavior
security
1
2
3
4
next ›
last »