Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
eavesdropping
biblio
Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures
Submitted by grigby1 on Tue, 03/01/2022 - 4:18pm
composability
eavesdropping
encryption
Hardware
intellectual property
Metrics
network on chip security
network-on-chip
pubcrawl
resilience
Resiliency
Scalability
security
system-on-chip
Transforms
biblio
The Strategy of Beating the Intermediate Basis Attack in Quantum Communication Networks
Submitted by aekwall on Mon, 11/29/2021 - 2:28pm
Protocols
pubcrawl
composability
Compositionality
eavesdropping
Bit error rate
Photonics
Quantum bit error rate
Quantum communication networks
quantum cryptography
WNl9 strategy
theoretical cryptography
biblio
When AI Gossips
Submitted by grigby1 on Tue, 10/12/2021 - 4:21pm
Metrics
standards
Stakeholders
social media
Scalability
Risk
pubcrawl
Privacy Policies
privacy
nudging
AI
Measurement
human rights
Human behavior
harm
Guidelines
gossip
eavesdropping
Artificial Intelligence
biblio
Safeguarding Backscatter RFID Communication against Proactive Eavesdropping
Submitted by grigby1 on Thu, 09/16/2021 - 2:13pm
pubcrawl
security
RFIDs
RFID
resource management
Resiliency
resilience
radiofrequency identification
Radio frequency identification (RFID)
radio frequency identification
artificial noise
proactive eavesdropping
physical layer security
optimization.
optimization
Human behavior
Games
eavesdropping
Backscatter communication
backscatter
biblio
Security of Satellite-Based CV-QKD under Realistic Assumptions
Submitted by grigby1 on Tue, 08/31/2021 - 1:12pm
quantum computing
security
pubcrawl
Apertures
eavesdropping
Photonics
Quantum Key Distribution
Receivers
satellite-based communication
Satellites
Scalability
biblio
Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels in IoT
Submitted by grigby1 on Tue, 08/31/2021 - 12:08pm
Metrics
wireless sensor networks
security
Scalability
Resiliency
resilience
Relays
random key generation
pubcrawl
physical layer security
partially colluding eavesdroppers
theoretical cryptography
key rate
key generation
Internet of Things
Human behavior
eavesdropping
Correlation
correlated eavesdropping channels
Channel estimation
Compositionality
composability
biblio
Achieving one-time pad via endogenous secret keys in wireless communication
Submitted by aekwall on Tue, 08/17/2021 - 4:16pm
key management
the one-time pad
Signal to noise ratio
secret key generation
resource management
physical layer security
Endogenous security
eavesdropping
Binary phase shift keying
security
Communication system security
Human behavior
Resiliency
Metrics
pubcrawl
Wireless communication
Scalability
biblio
Impact of Minimizing the Eavesdropping Risks on Lifetime of Underwater Acoustic Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:59pm
pubcrawl
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater
security
Scalability
Resiliency
resilience
Receivers
batteries
optimization
Numerical models
network lifetime
Metrics
Linear programming
Energy Efficiency
eavesdropping attack
eavesdropping
Cyber Physical System
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
P4NIS: Improving network immunity against eavesdropping with programmable data planes
Submitted by grigby1 on Tue, 03/09/2021 - 2:40pm
Servers
P4NIS
packet classification
performance evaluation
policy-based governance
programmable data planes
programming protocol-independent packet processor based network immune scheme
Protocols
pubcrawl
network paths
single network path
supercomputer computational capacity
telecommunication traffic
three lines of defense
traffic packets
transmission port field encryption
versatile attackers
encryption-based countermeasures
brute-force attacks
computer network security
Cryptography
diverse encryption algorithms
eavesdropping
eavesdropping attacks
encrypted packet transmission
encryption
brute force attacks
Human behavior
Human Factors
internet
Internet Protocol
IP
IP networks
network immunity
1
2
3
4
next ›
last »