Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Relays
biblio
Security versus reliability study for power-limited mobile IoT devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:29pm
Ad Hoc Network Security
composability
Human behavior
Human Factors
Internet of Vehicles
IoT security
IP networks
Mathematical model
Metrics
pubcrawl
Relays
Reliability
Resiliency
security
vehicular ad hoc networks
Wireless communication
biblio
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
IP networks
target services
Servers
Resiliency
Relays
pubcrawl
proxy-based architectures
proxy harvesting attack
Network reconnaissance
moving target defense approach
malicious client isolation
malicious client discovery
attacker reconnaissance effort
high-profile targets
end users
distributed denial of service attacks
DDoS attack mitigation
Conferences
computer network security
Computer crime
Communication networks
client-to-proxy assignment strategy
client shuffling
client remapping
biblio
Securing MDSplus for the NSTX-U Digital Coil Protection System
Submitted by grigby1 on Thu, 02/23/2017 - 2:27pm
NSTX-U digital coil protection system
Tokamak devices
superconducting coils
Software algorithms
Software
Servers
Relays
real-time systems
real-time
pubcrawl170106
protection
plasma toroidal confinement
CAMAC
NSTX
MDSplus
machine protection
Hardware
electrical limit
DCPS
data acquisition
data
control data acquisition hardware
control
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 1:05pm
pubcrawl
wireless channels
untrusted relay node
two hop interference untrusted relay channel
Trusted Computing
telecommunication security
structured codes
stochastic encoding
security
secure rate region
scaled compute-and-forward
Relays
relay networks (telecommunication)
radiofrequency interference
Science of Security
confidential messages
nested lattice codes
message transmission
message destination
Lattices
Jamming
Interference
Gaussian processes
Gaussian codewords
encryption block
encoding
direct links
Decoding
Cryptography
cooperative jamming
biblio
Recovery-based resilient latency-insensitive systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
logic circuits
Throughput
System performance
synchronous circuits
Synchronization
stalling signal
RLIS
Relays
recovery-based resilient latency-insensitive systems
queue sizing problem
clock cycle time
interconnect delay
Integrated circuit interconnections
improved queues
global stalling mechanism
expensive timing cost
error-recovery
error impact
Degradation
Clocks
biblio
A Modified Empirical Mode Decomposition Filtering-Based Adaptive Phasor Estimation Algorithm for Removal of Exponentially Decaying DC Offset
Submitted by BrandonB on Wed, 05/06/2015 - 9:25am
Heuristic algorithms
Relays
real power system fault signals
power system faults
Power system dynamics
Power harmonic filters
polynomials
polynomial approximation
phasor measurement
phasor estimation
optimum hermite polynomial fitting method
optimum hermite polynomial fitting
modified empirical mode decomposition filtering
adaptive dynamic phasor estimation algorithm
fundamental frequency component
exponentially decaying DC offset
estimation
Empirical mode decomposition
dynamic system fault
Discrete Fourier transforms
discrete Fourier transform
digital protective relays
Algorithm design and analysis
adaptive filters
adaptive filtering procedure
adaptive filtering
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:19pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
Scaling laws for secrecy capacity in cooperative wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:33am
path loss exponent
Wyner randomized encoder
wireless networks
Transmitters
Tin
telecommunication security
serial block Markov scheme
secure communication
secrecy capacity
scaling laws
Relays
relay networks (telecommunication)
active cooperative relaying
parallel relaying scheme
Markov processes
interference limited communications
interference (signal)
encoding
cooperative wireless networks
cooperative communication
beamforming
array signal processing
Aggregates
biblio
Formalizing Anonymous Blacklisting Systems
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
mail servers
trust assumptions
service providers
service provider
Resistance
Relays
real-world adoption
Protocols
privacy-enhanced revocation
privacy properties
privacy enhancing technologies
privacy
abusive anonymous users
IRC networks
internet
formalizing anonymous blacklisting systems
computer network security
authentication
anonymous revocation systems
anonymous communications networks
anonymous blacklisting systems
anonymous blacklisting
anonymity
« first
‹ previous
1
2
3
4
5
6
7
8