Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor networks
biblio
Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure
Submitted by aekwall on Fri, 01/20/2023 - 4:10pm
blockchains
Data models
distributed ledger
Fabrics
IoT
Meters
pubcrawl
Resiliency
Scalability
security
sensor networks
signature based defense
smart cities
biblio
On the Stability of Load Adaptive Routing Over Wireless Community Mesh and Sensor Networks
Submitted by grigby1 on Fri, 12/02/2022 - 11:14am
pubcrawl
Metrics
resilience
Resiliency
Throughput
Medical services
wireless sensor networks
Wireless communication
composability
Routing
Ad hoc networks
wireless mesh networks
and routing stability
load adaptive
sensor networks
biblio
Internet of Things-based Vehicle Tracking and Monitoring System
Submitted by grigby1 on Thu, 06/09/2022 - 9:13am
Metrics
internet of vehicles security
sensor networks
cyber physical systems
Arduino
Human Factors
GPS
Sensor Systems
cloud
Mobile Applications
Internet of Things
sensors
Prototypes
Internet of Vehicles
Safety
Resiliency
resilience
Human behavior
pubcrawl
Cloud Computing
biblio
Security Issues and Challenges in RFID, Wireless Sensor Network and Optical Communication Networks and Solutions
Submitted by grigby1 on Mon, 11/08/2021 - 1:32pm
radiofrequency identification
attacks
Communication networks
composability
Human behavior
Metrics
network security
optical network
Production
Protocols
pubcrawl
WSN
Reliability
resilience
Resiliency
RFID security
security
security and privacy
security goals
sensor networks
sensor security
wireless sensor networks
biblio
Tamarin software – the tool for protocols verification security
Submitted by aekwall on Tue, 10/12/2021 - 3:06pm
Software
privacy
Internet of Things
Protocols
tools
encryption
pubcrawl
composability
standards
Compositionality
Safety
policy-based governance
security protocols
sensor networks
Tamarin software
protocol verification
biblio
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
reputation
weather stations
trustworthiness approach
soft-security feature
self-data trust
reputation-based method
reputation indicators
peer-data trust
Pearson correlation
Meteorology Data
Meteorology
geophysics computing
Gaussian overlap
correlation theory
Autonomous Sensors
Time series analysis
IoT
sensor networks
Gaussian processes
Temperature measurement
sensor fusion
Indexes
trustworthiness
Data mining
Correlation
Peer-to-peer computing
composability
pubcrawl
Trusted Computing
data integrity
security of data
biblio
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
fault tolerant key generation
brute force attacks
Wireless communications
spread spectrum communication
sensor networks
Security parameters
secure spread spectrum communication
Secure Spread Spectrum
mobile ad hoc networks
mobile ad hoc network
level message security
level encryption securities
key generation
group key generation algorithms
Fault tolerant systems
Cryptography
complex Random key generation algorithms
client side encryption
attacks
fault tolerance
Brute Force Attack
AES
policy-based governance
Human Factors
Force
collaboration
pubcrawl
telecommunication security
Wireless communication
Servers
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
biblio
PRESERVING PARAMETER PRIVACY IN SENSOR NETWORKS
Submitted by aekwall on Mon, 04/20/2020 - 10:24am
Cramér-Rao lower bound
privacy models and measurement
utility loss
public parameter estimation
private parameter estimation
privacy gain functions
predefined privacy gain threshold
perturbation
parameter privacy preservation
parameter estimation
information privacy
inference allowance
decentralized sensors.
Cramér-Rao lower bounds
pubcrawl
linear model
Loss measurement
Perturbation methods
sensor networks
Silicon
data privacy
Noise measurement
sensor fusion
Indexes
Metrics
privacy
wireless sensor networks
1
2
3
4
next ›
last »