Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless communication
biblio
Self-sovereign Identity Management in Wireless Ad Hoc Mesh Networks
Submitted by aekwall on Mon, 01/31/2022 - 4:14pm
Mesh networks
wireless mesh networks
Wireless communication
Systems architecture
software reliability
Software
Self-sovereign Identity Management (SSI)
Prototypes
Power demand
Metrics
Scalability
MANET
lora
Internet of Things (IoT)
composability
Identity management
pubcrawl
Human behavior
Resiliency
biblio
IoT-Based Synergistic Approach for Poultry Management System
Submitted by grigby1 on Tue, 01/25/2022 - 5:03pm
wireless sensors
Automated Response Actions
poultry
monitoring system
early chicken
Temperature measurement
Birds
Temperature sensors
Sensor Systems
pubcrawl
Internet of Things
real-time systems
composability
Wireless communication
wireless sensor networks
Resiliency
resilience
biblio
On the RIS Manipulating Attack and Its Countermeasures in Physical-Layer Key Generation
Submitted by grigby1 on Tue, 01/11/2022 - 10:36am
reconfigurable intelligent surfaces
Wireless communication
Vehicular and wireless technologies
simulation
secret key generation
Scalability
Resiliency
resilience
reflection coefficient
active attack
reconfigurable intelligent surface
Quantization (signal)
pubcrawl
physical layer security
OFDM
Metrics
attack surface
biblio
Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems
Submitted by aekwall on Mon, 01/10/2022 - 12:48pm
Asymmetric Encryption
Compositionality
Resiliency
the 3rd Generation Partnership Project (3 GPP)
Subscription Permanent Identifier (SUPI)
Subscription Concealed Identifier (SUCI)
replay attack
home automation
guess attack
Elliptic Curve Integrated Encryption Scheme (ECIES)
security
Human behavior
Metrics
pubcrawl
Public key
Wireless communication
encryption
5G mobile communication
privacy
biblio
A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT
Submitted by grigby1 on Tue, 12/21/2021 - 10:17am
anonymity
anonymous messaging
authentication
Communication system security
Cryptography
Internet of Things
IoT
privacy
pubcrawl
Reliability
resilience
Resiliency
Scalability
verifiable encryption
Wireless communication
biblio
Reconfigurable Intelligent Surface Assisted Federated Learning with Privacy Guarantee
Submitted by grigby1 on Mon, 12/20/2021 - 1:19pm
Air gaps
Atmospheric modeling
composability
Computational modeling
Conferences
Human behavior
Metrics
privacy
pubcrawl
reconfigurable intelligent surfaces
resilience
Resiliency
simulation
Wireless communication
biblio
Frequency-based Automated Modulation Classification in the Presence of Adversaries
Submitted by aekwall on Mon, 12/20/2021 - 12:31pm
Human behavior
Adversary Models
RF signals
automatic modulation classification
adversarial attacks
Interference
Frequency modulation
Recurrent neural networks
privacy
security
Resiliency
Metrics
Scalability
pubcrawl
Wireless communication
machine learning
Perturbation methods
deep learning
biblio
Advanced Persistent False Data Injection Attacks Against Optimal Power Flow in Power Systems
Submitted by aekwall on Mon, 12/20/2021 - 12:22pm
Scalability
power systems
Wireless communication
pubcrawl
Metrics
Resiliency
Human behavior
cyber-physical systems
particle swarm optimization
cyber security
cyberattack
Surges
power generation
simulated annealing
advanced persistent threat
Optimal Power Flow (OPF)
biblio
Anomaly Detection in Vehicle Platoon with Third-Order Consensus Control
Submitted by aekwall on Mon, 12/20/2021 - 12:20pm
Ad Hoc Network Security
Compositionality
consensus strategy
cyber-security control
Fuels
information technology
Metrics
Platooning
pubcrawl
Resiliency
road safety
security
Transportation
VANET
vehicular ad hoc networks
Wireless communication
biblio
A Fuzzy Logic-Based Trust Estimation in Edge-Enabled Vehicular Ad Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 12:19pm
Metrics
Wireless communication
vehicular ad hoc networks
VANET
uncertainty
trust
security
Resiliency
pubcrawl
false trust
Image edge detection
Fuzzy sets
Fuzzy logic
estimation
edge computing
Compositionality
Ad Hoc Network Security
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »