Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless communication
biblio
vProfile: Voltage-Based Anomaly Detection in Controller Area Networks
Submitted by aekwall on Fri, 08/26/2022 - 11:56am
automotive
side-channel
Controller area network (CAN)
Production
Electric potential
Interference
Fingerprint recognition
cyber-physical systems
controller area network security
security
Internet of Things
Resiliency
pubcrawl
Wireless communication
Anomaly Detection
Intrusion Detection
authentication
biblio
An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
Submitted by grigby1 on Fri, 07/29/2022 - 9:04am
Smart Grid
power grid vulnerability analysis
session key
trusted authority
key agreement
secure communication
Metrics
Smart Grids
Wireless communication
smart meters
tools
Protocols
authentication
Scalability
Resiliency
resilience
pubcrawl
security
privacy
biblio
Bipartite Graph Matching Based Secret Key Generation
Submitted by grigby1 on Thu, 07/14/2022 - 6:15pm
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Radio frequency
performance evaluation
Scalability
Wireless communication
Metrics
Quantization (signal)
Physical layer
Time measurement
random key generation
biblio
Boosting Secret Key Generation for IRS-Assisted Symbiotic Radio Communications
Submitted by grigby1 on Thu, 07/14/2022 - 6:15pm
feature extraction
pubcrawl
Human behavior
resilience
Resiliency
Radio frequency
Scalability
Wireless communication
Switches
Metrics
simulation
Vehicular and wireless technologies
random key generation
Symbiosis
biblio
Encryption Algorithms based on Security in IoT (Internet of Things)
Submitted by aekwall on Thu, 07/14/2022 - 4:18pm
Smart homes
threats
Light Weight
key
Algorithm
QR codes
smart cities
Memory management
cyber-physical systems
Signal processing algorithms
Ciphers
Resiliency
pubcrawl
Wireless communication
wireless sensor networks
IoT
Cryptography
biblio
Wireless Cybersecurity Education: A Focus on Curriculum
Submitted by grigby1 on Wed, 07/13/2022 - 1:16pm
Metrics
wireless cyber education
Wireless communication
tools
Telecommunications
Standards organizations
Scalability
Resiliency
resilience
pubcrawl
policy governance
collaboration
Internet of Things
Human behavior
experiential training
cybersecurity education
Cybersecurity
cyber education paradigm
curricular design
computer security
composability
Communication system security
biblio
A Primitive Cipher with Machine Learning
Submitted by grigby1 on Wed, 07/13/2022 - 1:13pm
Ciphers
machine learning
pubcrawl
Resiliency
Conferences
Cryptography
Wireless communication
resilience
Artificial Neural Networks
Scalability
Device-to-device communication
outsourcing
exponentiation
edge intelligence
mobile edge learning
biblio
Facial Expression Recognition Method Based on Cascade Convolution Neural Network
Submitted by grigby1 on Tue, 07/05/2022 - 12:27pm
convolution
convolution neural network
Neural networks
pubcrawl
Human behavior
resilience
Resiliency
Heuristic algorithms
Databases
Wireless communication
Metrics
face recognition
facial recognition
Educational robots
facial expression recognition
Cascade Algorithm
biblio
On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel
Submitted by aekwall on Fri, 07/01/2022 - 9:49am
Protocols
Wireless communication
pubcrawl
Metrics
Resiliency
composability
encoding
Receivers
Knowledge engineering
Telecommunications
Transmitters
channel coding
biblio
Formalization of the Secrecy Capacity in Non-degraded Wiretap Channel
Submitted by aekwall on Fri, 07/01/2022 - 9:48am
Cryptography
Protocols
Wireless communication
pubcrawl
Metrics
Resiliency
composability
computer security
Communication system security
physical layer security
Channel models
information theory
channel coding
Formalization
secrecy capacity
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »