Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Manganese
biblio
Smart grid data privacy protection algorithm
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Communication Systems
Human behavior
Human Factors
Indexes
L-diversity algorithm
Manganese
privacy preserving
pubcrawl
resilience
Resiliency
Scalability
service computing
signal processing
smart gird
Smart Grid Privacy
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
smart grid communications
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
port mutation
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
end-to-end IP-Hopping technique
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
attack complexity
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
biblio
Resource allocation based on clustering algorithm for hybrid device-to-device networks
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Algorithm design and analysis
clustering algorithm
Clustering algorithms
D2D communication
Device-to-device communication
Information Reuse
Interference
Manganese
pubcrawl
Resiliency
resource allocation
resource management
security
Signal to noise ratio
biblio
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
pragmatic hazard
side channel attack
Security analysis
scalar multiplication
RNS
Resistance
Resiliency
residue number systems
residue number system
public key cryptography
pubcrawl
Algorithm design and analysis
power analysis
PA-FA countermeasure
Metrics
Manganese
fault injection attack
fault detection
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Electronic mail
composability
biblio
Towards efficient group management and communication for large-scale mobile applications
Submitted by BrandonB on Wed, 05/06/2015 - 2:14pm
Manganese
vehicles
surveillance
Subscriptions
reliable communication
real-time tracking
Real-time monitoring
public security
node mutual awareness
mobile workforce management
mobile systems
mobile nodes
mobile networks
mobile computing
middleware
collaboration
Logistics
Logic gates
large-scale mobile applications
group management
Group communication
geopositioning
fleet tracking and management system
Emergency Response
distributed middleware
DDS
context-specific group communication
context-defined groups
context-defined group management
biblio
Entity title architecture extensions towards advanced quality-oriented mobility control capabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
mobile computing
wireless quality conditions
wireless communication systems
Wireless communication
Streaming media
session quality requirements
quality of service
point of attachment decision
PoA candidates
PoA
networking functions
Multimedia communication
mobility management (mobile radio)
mobile multimedia networking
Mobile handsets
mobile devices
active session flows
MATLAB
Manganese
internet
information-centric entity title architecture
handover setup
Handover
future Internet clean slate approach
FI
ETArch
entity title architecture extensions
distinct applications scenario
delays
beyond-IP networking services
advanced quality-oriented mobility control capabilities
biblio
On Security-Effective and Global Mobility Management for FPMIPv6 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
handover latency
security-effective mobility management
security threats
Security analysis
public key cryptography
Protocols
packet loss reduction
network node
mobility management (mobile radio)
mobile node authentication
Manganese
Kang-Park-ESS-FH scheme
Internet Engineering Task Force
IETF
AAA
Handover
global mobility management
FPMIPv6 networks
FPMIPv6
fast handover-proxy mobile IPv6
ESS-FP
enhanced security scheme
Cryptographic Protocols
CGA method
CGA
authentication-authorization-accounting infrastructure
authentication
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:19pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
Institution Theory for Services Oriented Applications
Submitted by BrandonB on Fri, 05/01/2015 - 8:09am
Manganese
workflow applications
Unified modeling language
UML AD
UML activity diagram
System recovery
Syntactics
software engineering
service oriented applications
Semantics
semantic correctness
programming language semantics
Model transformation
Context
local semantic
institution theory
institution comorphism
Graphical Model
Grammar
formal verification
Formal Specification
Formal semantics
event-B specification
Event-B
diagrams
« first
‹ previous
1
2
3
next ›
last »