Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless communication
biblio
Information Theory Based Evaluation Method For Wireless IDS: Status, Open Problem And Future Trends
Submitted by grigby1 on Fri, 09/01/2023 - 2:24pm
Wireless communication
Human Factors
Solids
information theory
information theoretic security
Market research
uncertainty
Compositionality
Measurement
network security
composability
collaboration
Entropy
wireless sensor networks
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Intrusion Detection
biblio
Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
Submitted by grigby1 on Fri, 09/01/2023 - 2:24pm
Wireless communication
Multiple intelligent eavesdroppers
Human Factors
Nash Equilibrium
game theory
physical layer security
information theoretic security
Compositionality
Artificial Intelligence
Games
composability
deep learning
Protocols
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
collaboration
biblio
An Analysis of Insider Attack Detection Using Machine Learning Algorithms
Submitted by grigby1 on Fri, 08/25/2023 - 3:41pm
policy-based governance
Resiliency
classification
Measurement
Policy Based Governance
computer security
Wireless communication
Data models
security
resilience
insider threat
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
Insider Threat Detection
machine learning algorithms
machine learning
Predictive models
biblio
3CL-Net: A Four-in-One Networking Paradigm for 6G System
Submitted by grigby1 on Fri, 08/25/2023 - 10:59am
computer architecture
security
pubcrawl
resilience
Resiliency
Scalability
Wireless communication
Prototypes
Information Centric Networks
information-centric networking
6G mobile communication
ubiquitous computing
3CL-Net
3CL-Net based prototype
6G system
networking paradigm
biblio
6G toward Metaverse: Technologies, Applications, and Challenges
Submitted by grigby1 on Thu, 08/24/2023 - 2:50pm
virtual reality
Metaverse
6G
Human Factors
Cyber Physical System
user experience
6G mobile communication
cyber physical systems
data acquisition
immersive systems
Artificial Intelligence
social networking (online)
blockchain
composability
Wireless communication
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Game model of attack and defense for underwater wireless sensor networks
Submitted by grigby1 on Fri, 08/04/2023 - 11:15am
Wireless communication
Underwater wireless sensor network
strategy selection
Evolutionary Game
game theoretic security
Market research
Games
Attack detection
network security
pubcrawl
wireless sensor networks
Scalability
Analytical models
Heuristic algorithms
Metrics
Human Factors
Human behavior
biblio
Clustering-based routing protocol using FCM-RSOA and DNA cryptography algorithm for smart building
Submitted by grigby1 on Mon, 07/31/2023 - 1:26pm
DNA
Reptile Search Optimization
fuzzy rules
Fuzzy C-Means
African Vulture Optimization
Fuzzy Cryptography
smart buildings
DNA cryptography
Base stations
pubcrawl
Clustering algorithms
Wireless communication
wireless sensor networks
Scalability
Throughput
Resiliency
resilience
Metrics
biblio
Fuzzy Logic Based WSN with High Packet Success Rate and Security
Submitted by grigby1 on Fri, 07/28/2023 - 3:33pm
Streaming media
Security of WSN
packet delivery ratio
Fuzzy Inference System (FIS)
Wireless Sensor Network
Fuzzy logic
remote sensing
vehicular ad hoc networks
Receivers
Schedules
Wireless communication
wireless sensor networks
Safety
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Location-Based Reliable Sharding in Blockchain-Enabled Fog Computing Networks
Submitted by grigby1 on Fri, 07/21/2023 - 1:49pm
security
blockchain
pubcrawl
resilience
Throughput
Scalability
Wireless communication
Internet of Things
Reliability
Signal processing algorithms
simulation
Fog computing
Sharding
Resiliency
blockchains
fog computing network
biblio
Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network
Submitted by grigby1 on Thu, 07/20/2023 - 4:15pm
wireless sensor networks
Remote Patient Monitoring (RPM)
patient monitoring
Cuckoo filter
Resiliency
medical devices
expert systems
Privacy-preserving
Wireless communication
pubcrawl
Cloud Computing
Protocols
privacy
authentication
Scalability
resilience
Human behavior
1
2
3
4
5
6
7
8
9
…
next ›
last »