Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless communication
biblio
Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We?
Submitted by grigby1 on Fri, 05/12/2023 - 10:15am
Human behavior
Wireless communication
Stability analysis
security
Scalability
resilience
pubcrawl
Intelligent systems
Human Factors
CPS
False Data Injection
deception attacks
cyber-physical systems
Control Theory
adaptive control
actuators
Resiliency
biblio
On In-Vehicle Network Security Testing Methodologies in Construction Machinery
Submitted by grigby1 on Fri, 05/12/2023 - 10:12am
Productivity
Wireless communication
Software
security testing
SAE J1939
Resiliency
resilience
pubcrawl
Protocols
Internet of Vehicles
product development
pen testing
Human Factors
Human behavior
fuzzing
controller area network
construction machinery
security
biblio
A New Digital Predistortion Based On B spline Function With Compressive Sampling Pruning
Submitted by grigby1 on Fri, 04/28/2023 - 12:52pm
Stability analysis
volterra series
spline
Predistortion
digital predistortion
compressive sampling
Fitting
cyber-physical system
power amplifier
pubcrawl
Complexity theory
encoding
composability
Wireless communication
Computational modeling
privacy
Resiliency
resilience
biblio
Parasite Chain Attack Detection in the IOTA Network
Submitted by grigby1 on Fri, 04/14/2023 - 4:05pm
distributed ledger
Tangle
Parasite Chain
IOTA
Double-spend Attack
directed acyclic graph
dynamic graph
blockchains
Resiliency
Chained Attacks
Internet of Things
mobile computing
Image edge detection
Wireless communication
Scalability
resilience
pubcrawl
blockchain
Anomaly Detection
biblio
Self-coupling Encryption via Polar Codes for Secure Wireless Transmission
Submitted by grigby1 on Fri, 04/14/2023 - 3:53pm
encryption
pubcrawl
resilience
Wireless communication
composability
encoding
Metrics
Reliability
Receivers
simulation
channel coding
physical layer security
wireless networks
polar codes
Resiliency
codes
biblio
A Polar Coding Scheme for Achieving Secrecy of Fading Wiretap Channels in UAV Communications
Submitted by grigby1 on Fri, 04/14/2023 - 3:53pm
channel coding
UAV communication
polar coding
autonomous aerial vehicles
Symbols
Resiliency
secrecy capacity
wiretap channel
physical layer security
pubcrawl
fading channels
channel capacity
Transmitters
reliability theory
Metrics
composability
Wireless communication
resilience
biblio
Blind Identification of Channel Codes under AWGN and Fading Conditions via Deep Learning
Submitted by grigby1 on Fri, 04/14/2023 - 3:52pm
deep learning
feature extraction
pubcrawl
resilience
Wireless communication
composability
Metrics
Robustness
fading channels
channel coding
AWGN channels
physical layer security
Resiliency
codes
blind identification
channel codes
biblio
The Research on Fingerprint Encryption Algorithm Based on The Error Correcting Code
Submitted by grigby1 on Fri, 03/31/2023 - 11:24am
biometric encryption
pubcrawl
encryption
error correcting code
error correction
error correction codes
fingerprint detail-point
fingerprint encryption
Fingerprint recognition
image matching
Metrics
noise reduction
random key
resilience
Resiliency
Wireless communication
biblio
Security Assessment of Android-Based Mobile Terminals
Submitted by grigby1 on Fri, 03/31/2023 - 11:21am
security
pubcrawl
resilience
Scalability
Wireless communication
Measurement
Mobile Applications
Online banking
big data security metrics
analytic hierarchy process
security metric
Resiliency
fraud
analytical hierarchy process (AHP)
relative weight
security assessment
biblio
Adoption of a Secure ECC-based RFID Authentication Protocol
Submitted by grigby1 on Fri, 03/17/2023 - 12:52pm
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Protocols
Wireless communication
Elliptic curve cryptography
Telecommunications
ECC
RFID
Human Factors
RFIDs
authentication protocol
Wireless attack
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »