Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Performance analysis
biblio
Performance Analysis of FSO Systems over Imperfect Málaga Atmospheric Turbulence Channels with Pointing Errors
Submitted by aekwall on Mon, 03/15/2021 - 10:56am
Probability density function
realistic channel model
pointing errors
Monte-Carlo simulations
Málaga turbulence channel
imperfect Málaga atmospheric turbulence channels
imperfect Gamma-Gamma channels
FSO communication systems
ergodic channel capacity expressions
ergodic channel capacity
ECC metrics
composite probability density function
channel estimation errors
average bit error rate
atmospheric turbulence
BER
Resiliency
bit-error-rate
Performance analysis
Channel models
optical links
Channel estimation
Communication Systems
Atmospheric modeling
error correction codes
Monte Carlo methods
error statistics
channel coding
channel capacity
Metrics
composability
pubcrawl
biblio
A Novel Group-Based Authentication and Key Agreement Protocol for IoT Enabled LTE/LTE–A Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
Long Term Evolution
telecommunication security
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance analysis
MTCD
Metrics
Machine Type Communication Devices
LTE/LTE–A
LTE/LTE-A network
authentication
IoT
Internet of Things
Human behavior
heterogeneous devices
group-based authentication and key agreement protocol
Gold
Cryptographic Protocols
Complexity theory
BIOS
biometric authentication
Bio-metric
authorisation
biblio
Performance Analysis on Enhanced Round Function of SIMECK Block Cipher
Submitted by grigby1 on Tue, 03/09/2021 - 1:39pm
enhanced round function
policy-based governance
Human Factors
security measurements
Performance analysis
lightweight block ciphers
security requirements
resource-constrained devices
Internet of Things technologies
security level
algorithm design
enhanced ARX structure
Cryptography
LBC
IoT
encryption time
SIMON
SIMECK family block cipher
avalanche effect
Brute-force Attack
brute force attacks
software performance evaluation
Internet of Things
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 11:38am
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network)
Submitted by aekwall on Tue, 03/09/2021 - 11:36am
Packet loss
ns2
normal network conditions
largest remaining energy
flooding attack AODV routing protocol
Flooding Attack
energy-efficient AODV
energy parameters
different network conditions
Black hole attacks
Vehicular Ad-hoc Network
Performance analysis
wireless technology
Black hole attack
Energy
AODV
Scalability
data communication
Blackhole attack
Throughput
VANET
quality of service
delays
Energy Efficiency
Wireless communication
vehicular ad hoc networks
malicious nodes
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
A Small Sample DDoS Attack Detection Method Based on Deep Transfer Learning
Submitted by grigby1 on Tue, 02/16/2021 - 11:57am
neural nets
DDoS attack detection
small-sample DDoS attack detection
small sample DDoS attack
deep transfer learning
deep learning detection technique
8LANN network
transfer learning
denial-of-service attack
Degradation
Performance analysis
Measurement
deep learning
composability
Communication networks
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Neural networks
learning (artificial intelligence)
biblio
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure
Submitted by grigby1 on Tue, 02/16/2021 - 11:42am
SDN infrastructure
Network Security Architecture
networking arena
Performance analysis
policy-based approach
Policy-based Security Architecture
pubcrawl
resilience
SDN based enterprise networks
network devices
SDN security
secure SDN
security attacks
security measures
security policies
software defined networking
telecommunication security
Dynamical Systems
network attacks
Metrics
Enterprise Network Security
dynamic policy framework
dynamic policy enhanced integrated security architecture
dynamic networks
dynamic changes
different security mechanisms
computer network security
computer network management
business communication
authorisation
composability
Predictive Metrics
Resiliency
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
A novel solution for securing robot communications based on the MQTT protocol and ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
ROS-enabled robotic systems
resilience
Resiliency
robot communications
Robot Operating System
robot operating systems
robot programming
robotic applications
robotic solutions
ROS
ROS-enabled robotic surveillance system
queueing theory
securing ROS-enabled robotic system
security
security of data
security threats
Servers
Service robots
telecommunication security
telemetry
transport protocols
medical robotic surveillance
automatic robotic surveillance
Data Security
delays
hijacking attacks
Human behavior
Human Factors
internet
IoT
man-in-the-middle attacks
authentication
Message Queuing Telemetry Transport protocol
mobile robots
MQTT
MQTT protocol
operating systems (computers)
Performance analysis
policy-based governance
Protocols
pubcrawl
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
Computational modeling
outsourced decryption
Online/Offline Encryption
multiauthority attribute-based encryption
Multi-Authority Attribute-Based Encryption
MA-ABE schemes
large-universe MA-CP-ABE scheme
ciphertext pool
encryption algorithm
Performance analysis
fine-grained access control
edge computing
IoT
policy-based governance
pubcrawl
Human behavior
Internet of Things
attribute-based encryption
data privacy
Access Control
encryption
Cryptography
authorisation
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »