Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bandwidth
biblio
Spectral Scrambling for High-security PAM-8 Underwater Visible Light Communication System
Submitted by grigby1 on Mon, 01/21/2019 - 11:20am
pubcrawl
Metrics
Resiliency
Scalability
Bandwidth
Cryptography
Discrete Fourier transforms
light emitting diodes
PAM modulation
Photonics
physical-layer security
underwater visible light communication
visible light communication
Visible Light Communications Security
biblio
A Command-by-Intent Architecture for Battlefield Information Acquisition Systems
Submitted by grigby1 on Mon, 12/10/2018 - 10:34am
pubcrawl
military operations
mission information
mission information needs
mission success rate
mission-critical decision making
NATO-based mission scenario
network resources
operational mission goals
Prefetching
military computing
real-time information collection
resilience
Resiliency
Scalability
sensor fusion
Sensor Systems
subordinate units
target tracking
target tracking application
Decision Making
Bandwidth
battlefield information acquisition systems
cache storage
Command-by-intent
command-by-intent architecture
commander intent
data fusion system
Data integration
decision authority
Anglova
Decision trees
Decision-centric
forwarding caching relevant data
Human Factors
information needs
Information systems
Internet of battlefield things
iobt
biblio
Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 11:24am
Servers
NS3 simulation
Probabilistic logic
pubcrawl
re-transition timeout mechanism
resilience
Resiliency
Routing protocols
Scalability
NS-3 Simulation
sigmoid filter optimization
TCP congestion control window algorithm
TCP packet size
telecommunication congestion control
telecommunication traffic
threshold bandwidth filter
transport protocols
attacker traffic
network efficiency
MATLAB
low-rate DoS attack detection
low-rate denial of service attack detection
low-rate bandwidth
Human Factors
honey-pot server
honey pots
high rate attacks
filtering theory
distributed DoS
denial of service (dos)
computer network security
Computer crime
Bandwidth
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 10:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
biblio
Robust IoT communication physical layer concept with improved physical unclonable function
Submitted by grigby1 on Mon, 06/11/2018 - 2:48pm
Ring Oscillator
Microelectronics Security
Physical Unclonable Function
pubcrawl
PUF
PUF-interfacing communication physical layer hardware
random identification hardware
reliability problems
resilience
Resiliency
Metrics
robust IoT communication physical layer
robust IoT communication physical layer concept
robust monitoring concepts
Robustness
size 65.0 nm
Spectral analysis
suitable physics
tuning
computer network security
Asia
Bandwidth
client-to-cloud communication physical layer
Cloud Computing
cloud-interfacing point
CMOS
CMOS technology
composability
aging
Conferences
generated PUF word
Hardware
hardware concepts
improved physical unclonable function
Internet of Things
IoT concept
IoT-cloud-based communication
biblio
Bandwidth Prediction on a WiMAX Network
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
Mobile communication
wireless
WiMAX network
WiMax
RSSI
receive signal strength indicator
prediction
next-generation networking technology
next generation networks
Bandwidth
IEEE 802.16 standard
IEEE 802.11 Standards
high-speed network access
Educational institutions
Correlation
CINR
carrier to interference plus noise ratio
bandwidth prediction
1536086
biblio
A Mobile Geo-Communication Dataset for Physiology-Aware DASH in Rural Ambulance Transport
Submitted by el_wehby on Wed, 05/16/2018 - 5:17pm
Bandwidth
GPS
network profiling
Physiology-aware DASH
1545008
biblio
Network economics of SDN-based infrastructures: Can we unlock value through ICN multicast?
Submitted by K_Hooper on Wed, 05/09/2018 - 9:52am
network economics
Web and internet services
Unicast
software defined networking
SDN security
SDN infrastructure
Scalability
Routing protocols
routing infrastructures
Resiliency
pubcrawl
Protocols
performance evaluation
operator networks
Bandwidth
native IP multicast
multicast protocols
migration costs
lightweight multicast service delivery
IP-over-ICN deployments
IP networks
IP multicast delivery
Internet Protocol services
internet
information-centric networking principles
ICN multicast
Economics
computer network security
biblio
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
network steganography
Traffic Coloring
steganography detection approach
steganography detection
Steganography
RTP
RTCP
real-time systems
real-time services
pubcrawl
Protocols
privacy
overt protocols
network traffic coloring
network threats
Bandwidth
Metrics
malicious control server
inter-protocol steganography
inter-protocol hiding techniques
Information hiding
Google
Electronic mail
delays
defensive systems
Data visualization
data encapsulation
Cryptographic Protocols
computer network security
composability
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
intrusion protection system
software heterogeneity
Servers
security
Resiliency
resilience
pubcrawl
Protocols
Probes
personal area networks
network technology
network security
Network scans
network scan
IoT devices
IoT
6LoWPAN
Internet of Things
internet
interconnectivity
IEEE 802.15 Standard
IEEE 802.11 Standard
heterogeneous IoT networks
hardware heterogeneity
Fingerprinting
Cyber Physical Systems Security
computer network security
composability
complex security protocols
Bandwidth
active network measurements
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »