Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
wireless LAN
biblio
MuTrack: Multiparameter Based Indoor Passive Tracking System Using Commodity WiFi
Submitted by grigby1 on Tue, 02/16/2021 - 12:26pm
privacy
pubcrawl
Human behavior
resilience
Resiliency
Indexes
target tracking
Reliability
Compositionality
tracking
Wireless fidelity
wireless LAN
indoor radio
Kalman filters
Data Sanitization
elderly care
WiFi
background clutter signals
Clutter
commodity WiFi devices
conjugate operation
contactless awareness applications
device-free localization-tracking
DFLT system
home security
Hungarian Kalman filter
indoor environment
indoor passive tracking system
low-resolution parameter estimates
multi-dimensional parameters
multidimensional parameters estimator
multiparameter based indoor passive tracking system
MuTrack
parameter estimation
path components
path parameters
Radar tracking
random phase errors
receiving antennas
reference antenna
reliability index
signal sanitization
weak target echoes
WiFi signal
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 12:01pm
security of data
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
wireless LAN
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
covered direction-finding
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
packet loss avoidance
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
biblio
A Proof of Concept Denial of Service Attack Against Bluetooth IoT Devices
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
tools
Internet of Things
security
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
computer network security
Software
telecommunication security
Protocols
personal area networks
standards
composability
Ad hoc networks
wireless LAN
human computer interaction
wireless networks
denial of service
Bluetooth devices security
Bluetooth IoT devices
Bluetooth technologies
concept denial
device-to-device communications
forming ad hoc networks
frequency-hoping spread spectrum technique
operation necessitates special hardware
proof-of-concept DoS attack
study Bluetooth device security
study Bluetooth security
bluetooth security
biblio
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Submitted by aekwall on Mon, 12/14/2020 - 11:43am
Robot Trust
backscatter
batteryless backscatter tags
bulky multiantenna systems
collaboration
collaborative tasks
composability
computer network security
featherlight backscatter tags
fictitious robots
fine-grained physical layer signatures
fundamental trust assumption
lightweight Sybil-resilient multirobot networks
lightweight system
Metrics
miniaturized robots
mobile robots
Multi-robot network
multi-robot systems
multipath manipulation
pubcrawl
radio links
radiofrequency identification
Resiliency
rich multipath features
Robot kinematics
Robot sensing systems
robotic collaboration
ScatterID actively manipulates multipath propagation
single-antenna robot
Sybil attack detection
Sybil attackers
sybil attacks
telecommunication security
Trajectory
Wireless communication
wireless LAN
wireless medium
wireless networking
wireless sensor networks
biblio
Optimized Time-Frequency Processing Dedicated to the Detection of Jamming Attacks on Wi-Fi Communications
Submitted by grigby1 on Fri, 12/11/2020 - 1:42pm
attacks
communication terminal
convolution
IEEE 802.11n Standard
Jamming
jamming signals
Metrics
microsoft windows
OFDM
optimized time-frequency processing
pubcrawl
reception stage
resilience
Resiliency
Scalability
security
signal processing
specific signal processing
telecommunication security
Time Frequency Analysis
Time-frequency Analysis
Wi-Fi communication signals
wireless communication network
Wireless fidelity
wireless LAN
biblio
Throughput Control Method Between Different TCP Variants Based on SP-MAC Over WLAN
Submitted by grigby1 on Wed, 12/02/2020 - 12:52pm
access point
access protocols
carrier sense multiple access
collision avoidance
Compound TCP
Compounds
coupled congestion control
CUBIC-TCP
media access control
media access control method
Media Access Protocol
Oscillators
pubcrawl
resilience
Resiliency
Scalability
SP-MAC
synchronisation
Synchronization
Synchronization phenomena of Coupled oscillator
synchronization phenomena of coupled oscillators
TCP variants
TCP versions
telecommunication congestion control
Throughput
throughput control method
throughput guarantee control method
total throughput
transport protocols
Wireless communication
wireless LAN
wireless local area networks
wireless terminals
WLAN
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
computer network security
Monitoring
data privacy
Internet of Things
IoT devices
Protocols
Resiliency
Human behavior
pubcrawl
location privacy
Mobile handsets
privacy
Metrics
smart phones
mobile radio
tracking
wireless LAN
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
mobile devices security breaches
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 10:45am
security
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
autonomous aerial vehicles
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
Drone
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
Computing Theory
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
differential privacy guarantee
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
indoor localization
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
pubcrawl
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
biblio
Wireless Self-Organizing Wi-Fi and Bluetooth based Network For Internet Of Things
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
Internet of Things
Switches
Power demand
pubcrawl
composability
Resiliency
resilience
Human behavior
wireless channels
wireless networks
Routing
Wireless fidelity
cyber physical systems
power consumption
Bluetooth
Cyber Physical System
energy conservation
energy-saving modes
modems
open standards
self-organizing networks
telecommunication power management
transmission channels
Wi-Fi
Wi-Fi network
wireless LAN
wireless self-organizing Wi-Fi
bluetooth security
1
2
3
4
5
6
next ›
last »