Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Relays
biblio
Detection of Sybil Attack on Tor Resource Distribution
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
Approximation algorithms
tor resource distribution
tor anonymous communication system
suspicious malicious users
resource distribution process
resource distribution
minimum malicious user
Integer Linear Program
enumeration attacks
Distribution strategy
computer program
anonymous communication system
Bipartite graph
Linear programming
detection method
Bridges
computer network security
Communication Systems
integer programming
Relays
Web sites
sybil attacks
Metrics
resource management
graph theory
Sybil attack
detection
composability
pubcrawl
Resiliency
network security
biblio
Partially Predictable Vehicular Ad-hoc Network: Trustworthiness and Security
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
cloud
Trustworthiness Evaluation
secure trustworthiness evaluation based routing protocol
road traffic safety
road traffic efficiency
partially predictable vehicular ad-hoc network
Partially Predictable Network (PPN)
NS2 software
normalized routing overhead
Key-encrypted onion
intelligent communications
hybrid protocol
average end to end delay
road traffic
road safety
Relays
VANET
trustworthiness
packet delivery ratio
vehicular ad hoc networks
Routing
Routing protocols
composability
pubcrawl
Cryptographic Protocols
security
telecommunication security
Big Data
biblio
Congestion aware traffic grooming in elastic optical and WiMAX network
Submitted by grigby1 on Wed, 12/02/2020 - 1:52pm
telecommunication network topology
Relays
resilience
Resiliency
resource allocation
Routing
Scalability
telecommunication congestion control
telecommunication network routing
pubcrawl
telecommunication traffic
Traffic grooming
WDM-PON (Wavelength Division Multiplexed Passive Optical Network)
WiMax
WiMAX network
wireless networks
Wireless-Optical/Optical-Wireless Network
Worldwide Interoperability Microwave Access Network
Light trail WiMAX (World Interoperability for Microwave Access Network)
Base stations
BVT (Bandwith Variable Transponder)
congestion aware traffic
coupled congestion control
Coupled Congestion Control 2019
Elastic Optical Network
internet
internet accessibility
Bandwidth
network congestion
network resource consumption
network resource utilization
network topologies
OLT (Optical Line Terminal)
ONU (Optical Network Unit)
Passive Optical Network
Passive optical networks
biblio
Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in CPS Security Testbed
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
large-scale grid models
cyber-event-triggered power system blackout
cyber-physical system testbeds
grid data streams
hardware-in-the-loop
hardware-in-the-loop CPS security testbeds
HIL CPS security testbed
HIL multigrid system
HIL realtime digital simulator environment
IEEE-118 bus grid model
IEEE-39 bus grid models
industry-grade hardware
interdependent events
cyber-event-triggered power grid blackout
modular integration designs
Multi-Grid
multigrid isolated models
multitude designs
phasor measurement
physics-constrained recovery
Power and Cyber System Testbed
real-time execution environment
restoration process
synthetic grid model
Ukrainian grid
IEC standards
security
CPS
cyber-physical systems
Metrics
resilience
Resiliency
IEEE standards
Computational modeling
power engineering computing
composability
real-time systems
power grids
security of data
SCADA
Scalability
Relays
WAMS
Software systems
Concurrent computing
Phasor measurement units
cyber physical systems
100% realtime performance
Concurrency
coordinated cyber attacks
biblio
Development of a Cyber-Resilient Line Current Differential Relay
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
power system relaying
cyber-security concerns
digital communication channels
false line tripping
FDIA
LCDR
LCDR's trip command
line current differential relays (LCDRs)
line terminals
measured superimposed voltages
positive-sequence
cyber-resilient line current differential relay
power transmission faults
protected line
protection systems
remote current measurement
superimposed voltage
Transmission line measurements
transmission line protection
two-terminal lines
command injection attacks
Metrics
Cyber-security
pubcrawl
resilience
Resiliency
Circuit faults
power engineering computing
power system security
composability
computer security
cyber-physical systems
security of data
power transmission lines
power transmission protection
Voltage measurement
false data injection attacks
Global Positioning System
Relays
Current measurement
relay protection
coordinated attacks
biblio
On Security Capability of Cooperative Communications in Energy Scavenging Cognitive Radio Networks
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
relay networks (telecommunication)
Cognitive Radio Security
precise closed-form formula
power division
noncognitive networks
message recovering time
Manganese
ESCRNs
energy scavenging time
energy scavenging cognitive radio networks
energy scavenging
cooperative communications
SOP
secrecy outage
security
secrecy outage probability
cognitive radio
energy harvesting
Interference
Relays
cooperative communication
telecommunication network reliability
telecommunication power management
Analytical models
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Security Analysis for Cognitive Radio Network with Energy Scavenging Capable Relay over Nakagami-m Fading Channels
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
Cognitive Radio Network
Cognitive Radio Security
underlay cognitive network
SOP
secrecy outage
relay networks (telecommunication)
power constraints
Nakagami-m fading channels
Nakagami-m
energy scavenging capable relay
energy scavenging
closed-form expression
secrecy outage probability
relaying
Nakagami channels
security
cognitive radio
information processing
energy harvesting
Relays
fading channels
telecommunication network reliability
probability
Decoding
Security analysis
telecommunication security
Resiliency
resilience
pubcrawl
biblio
Physical Layer Security of a Two-Hop Mixed RF-FSO System in a Cognitive Radio Network
Submitted by grigby1 on Fri, 09/18/2020 - 1:55pm
physical layer security
dual-hop transmission
end-to-end signal-to-noise-ratio
free space optical link
FSO
FSO links
gamma distribution
Gamma-Gamma distribution
licensed primary user
Nakagami channels
optical links
cognitive-radio system
physical layer security performance
PU receiver
relay
relaying
RF links
secrecy outage probability
two-hop mixed RF-FSO system
unlicensed secondary user
Cognitive Radio Security
cooperative communication
pubcrawl
resilience
Resiliency
Radio frequency
telecommunication security
Signal to noise ratio
Receivers
probability
telecommunication network reliability
Capacity planning
security
Relays
Rayleigh channels
Interference
cognitive radio
amplify and forward communication
asymmetric radio frequency link
atmospheric turbulence
average secrecy capacity
Cognitive Radio Network
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
Markov processes
Chained Attacks
target NFC network
near-field communication
markov chain
intrusive detection system
electronic payment cases
attack anomalies
Near Field Communication
Training data
security of data
embedded system security
Relays
relay attack
Google
pubcrawl
Resiliency
Data models
security
Scalability
biblio
Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure
Submitted by grigby1 on Fri, 08/28/2020 - 12:03pm
IoT
vulnerabilities
vehicular ad hoc networks
vehicle-automotive security
transportation infrastructures
Telematics
smart automobiles
scientific computing
Scalability
road infrastructure
Resiliency
resilience
Relays
pubcrawl
mobile robots
5G mobile communication
Internet of Things
infrastructure attack vectors
Human behavior
fuzzing
Engines
computer network security
computational intelligence
autonomous vehicles
autonomous cars
automotive cybersecurity
automobiles
Attack vectors
attack surface
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »