Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
computer network reliability
biblio
On Some Universally Good Fractional Repetition Codes
Submitted by
grigby1
on Tue, 12/15/2020 - 12:26pm
pubcrawl
Metrics
resilience
Resiliency
computer network security
optimization
security
Cryptography
storage management
network security
computer network reliability
optimisation
Compositionality
data storage
network theory (graphs)
network coding
coding theory
storage overhead
Data storage systems
distributed storage systems
encoded packet replication
heterogeneous DSS
minimum distance bound
multidimensional optimization problem
partial regular graph
universally good Fractional Repetition codes
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by
grigby1
on Wed, 12/02/2020 - 12:53pm
Bayes methods
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
computer network reliability
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
coupling model
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
power information
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
biblio
SharaBLE: A Software Framework for Shared Usage of BLE Devices over the Internet
Submitted by
grigby1
on Tue, 12/01/2020 - 3:38pm
application program interfaces
BLE-equipped device
Bluetooth
bluetooth low energy
Cloud Computing
cloud-based software framework
collaboration
composability
computer network reliability
energy consumption
generic service stack
Human behavior
Human Factors
internet
Internet of Things
Internet-scale Computing Security
Logic gates
Metrics
Policy Based Governance
pubcrawl
remote BLE IoT devices
resilience
Resiliency
RESTful API
Scalability
Servers
short communication range
Software
wireless communication technologies
biblio
Comparative study on KP-ABE and CP-ABE algorithm for secure data retrieval in military network
Submitted by
grigby1
on Fri, 07/24/2020 - 11:31am
attribute based encryption
Attribute Revocation and Attribute Based Encryption
authorisation
cipher text approach
collaboration
computer network reliability
computer science
CP-ABE algorithm
Cryptography
Decentralized Networks
disruption-tolerant networks
Disruption-Tolerant systems
encryption
Key Escrow
Key Managements
key policy attribute based encryption
key revocation
KP-ABE
military communication
military computing
military network
policy-based governance
pubcrawl
Reliability
reliable data transmission
remote devices
Scalability
secure data retrieval
war zone
biblio
QUIC-FEC: Bringing the benefits of Forward Erasure Correction to QUIC
Submitted by
grigby1
on Fri, 06/19/2020 - 10:33am
composability
computer network reliability
computer network security
Convolutional codes
convolutional RLC error-correcting codes
error correction codes
Forward Erasure Correction
forward error correction
IETF
in-flight communications
interference (signal)
internet
loss-based congestion
Metrics
pubcrawl
QUIC
QUIC specification
QUIC-FEC
quick UDP Internet connections
Reed-Solomon codes
resilience
Resiliency
TCP/TLS/HTTP/2 stack
telecommunication congestion control
transport protocols
user datagram protocol
XOR codes
biblio
Security Aware Spatial Modulation (SA-SM)
Submitted by
aekwall
on Mon, 06/15/2020 - 10:01am
IoT
computer network security
Internet of Things
Receivers
security
Radio frequency
Resiliency
pubcrawl
composability
Metrics
Decoding
error statistics
computer network reliability
spectral efficiency
radio receivers
OFDM
forward error correction
adjacent channel interference
arising security concerns
bit-error-rate
communication system capacity
communication system reliability
degree of technology independent physical layer security
forward-error-correction threshold
HN
interchannel interference
Internet-of-Things deployments
MIMO
MIMO communication
MIMO techniques
multiple-input multiple-output techniques
optical transmitters
Peak to average power ratio
peak-to-average-power-ratio
radio range
SA-SM
secure technique
security aware spatial modulation
SM
space division multiplexing
spatial multiplexing
system complexity
visible light range
VLC
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by
grigby1
on Mon, 06/01/2020 - 2:58pm
6LoWPAN based Internet of Things
anomaly based approach
Blackhole
Blackhole attack
Blackhole detection
Blackhole formation
computer network reliability
computer network security
DoS attacks
Internet of Things
Intrusion Detection
Intrusion detection mechanism
Linear programming
malicious blackhole nodes
Measurement
network devices
network lifetime
packet delivery ratio
personal area networks
promiscuous mode
pubcrawl
resilience
Resiliency
Routing
Routing Protocol
Routing protocols
RPL
Scalability
SIEWE
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
Watchdog based approaches
biblio
Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks
Submitted by
grigby1
on Mon, 06/01/2020 - 2:58pm
advanced metering infrastructure
Advanced Metering Infrastructure (AMI)
AMI network
authentication
authorisation
Blackhole attack
computer network reliability
computer network security
cuckoo filter based RPL
cuckoo filter.
cuckoo-RPL
Cyber Attacks
filtering theory
IETF ROLL working group
Law
power system security
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
RPL
Scalability
Smart Grid
smart meters
smart power grids
version number attack
Wireless communication
biblio
Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With the Named Data Architecture
Submitted by
aekwall
on Tue, 05/26/2020 - 10:11am
computer network security
IP networks
Scalability
Servers
telecommunication traffic
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Routing protocols
Roads
vehicular ad hoc networks
internet
radio networks
VANET
data storage
computer network reliability
vehicular ad hoc network
vehicles
ad hoc communications
data dissemination
data dissemination protocol
data received ratio
distributed roadside unit
improved network connectivity
intelligent transport system (ITS)
intermittent connection lifetime
multihop wireless network
named data architecture
named data network (NDN)
named data networking approach
NDN architecture
network simulator
NS3 software packages
RA-NDN protocol
real-world data
SA-RSU
stand-alone node RSU
SUMO software packages
TCP/IP implementation
total dissemination time
traffic load
traffic simulator software
vehicle to roadside unit (V2R)
vehicular ad hoc network (VANET)
vehicular densities
vehicular NDN
vehicular transmission ranges
Named Data Network Security
biblio
A hierarchical approach to self-test, fault-tolerance and routing security in a Network-on-Chip
Submitted by
grigby1
on Fri, 05/15/2020 - 11:44am
network on chip security
Scalability
resilience
Resiliency
Metrics
associated physical channels
bus interconnects
chip multiprocessors
communication efficiency
computer network reliability
computer network security
deadlock situation
deadlock-free properties
denial-of-service attacks
external source
fault data
fault tolerant computing
fault-information
fault-tolerance aspects
fault-tolerant routing
flit-switching
hierarchical approach
internet
local processing element
local router
local self-test manager
malformed packets
malicious denial-of-service attack
malicious external agent
microprocessor chips
multiprocessing systems
network bandwidth
network-on-chip
NoC
on-chip networks
packet switching
packet-switching
power virus
routing agent
routing security
security concerns
sorting-based algorithm
telecommunication network routing
test algorithms
two-tier approach
two-tier solution
virtual channel flow control
virtual channels
1
2
3
4
next ›
last »