Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Data Transmission
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by
aekwall
on Mon, 12/21/2020 - 12:36pm
IoT
computer network security
Servers
encryption
Internet of Things
Cryptographic Protocols
Protocols
Trusted Computing
pubcrawl
composability
blockchain
data analysis
secure protocol
trustworthiness
Relays
Data Transmission
smart cities
Artificial Intelligence
digital signatures
IoT device
TEE
artificial intelligence technology
Trusted Execution Environment
data trustworthiness
AI technology
authenticated encryption method
blockchain ledger
data analysis methods
physically unclonable function
trusted hardware
biblio
On the Large-Scale Traffic DDoS Threat of Space Backbone Network
Submitted by
grigby1
on Tue, 12/01/2020 - 12:46pm
Bandwidth
bandwidth resource
composability
Computer crime
computer network security
data communication
Data Transmission
DDoS
DDoS attackers
defense
denial-of-service attack
global coverage
ground networks
IDS
internet
intrusion detection system
large-scale traffic DDoS threat
pubcrawl
reflection
reflection amplification attack
reflection amplification attacks
resilience
Resiliency
satellite communication
satellite network
satellite networks
Satellites
service delivery
space backbone network
space communication links
Space vehicles
telecommunication traffic
terminal devices
biblio
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
Submitted by
aekwall
on Mon, 10/19/2020 - 11:07am
Cloud Computing
Scalability
authorisation
Cryptography
data owners
encryption
Access Control
data privacy
Internet of Things
Resiliency
pubcrawl
blockchain
Data Transmission
outsourcing
smart contract
fine-grained access control
IoT environments
data management
cloud repositories
data users
fine-grain access control system
key-policy attribute-based encryption (KP-ABE)
outsourced cloud data
secured fine-grained selective access
Key Policy Attribute Based Encryption (KP-ABE)
KP-ABE
biblio
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems
Submitted by
aekwall
on Mon, 09/28/2020 - 11:01am
IoT
Cloud Computing
Scalability
data privacy
privacy concerns
Internet of Things
Resiliency
Human behavior
pubcrawl
Protocols
middleware
Data Transmission
Fog computing
Data models
data management
fog nodes
edge devices
queueing theory
telemetry
Advanced Message Queuing Protocol
data management portfolio
data portfolio
Data Privacy for Fog-to-Cloud (DPPforF2C)
data service model
DPPforF2C
fog architecture
fog-to-cloud computing systems
Message Queuing Telemetry Transport
practical data model
privacy architecture
sample data models
Computing Theory and Privacy
biblio
Application of Bit Interleaving to Convolutional Codes for Short Packet Transmission
Submitted by
aekwall
on Tue, 09/08/2020 - 9:05am
Resiliency
pubcrawl
composability
simulation
Wireless communication
Metrics
Reliability
channel coding
Data Transmission
error correction
telecommunication network reliability
industrial wireless networks
Convolutional codes
Error analysis
communication system
modulation coding
bit interleaving
bit interleaving channel coding
bit interleaving coding schemes
bit interleaving structure
code coding scheme
High reliability
industrial wireless communication
interleaved codes
Interleaver
long packet transmission
radiocommunication
short packet transmission
short packets
biblio
A highly accurate machine learning approach for developing wireless sensor network middleware
Submitted by
aekwall
on Mon, 06/01/2020 - 9:47am
composability
confusion matrix
Data Transmission
detector
fake data
Gallium nitride
gan
GANs
Generative Adversarial Networks algorithm
generator
Generators
intelligent middleware
learning (artificial intelligence)
machine learning
malicious attacks
middleware
middleware security
policy-based governance
pubcrawl
resilience
Resiliency
security
security of data
security problems
sensors
Unsupervised Learning
unsupervised learning technique
visualization
wireless sensor network middleware
wireless sensor networks
WSN
WSNs
biblio
A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid
Submitted by
aekwall
on Mon, 03/16/2020 - 9:42am
Cryptography
encryption
security
pubcrawl
data compression
Image coding
DNA
Data Transmission
resilience
Predictive Metrics
Compositionality
Scientific Computing Security
Encryption technique
secret data
channel medium
compact form
compacted information
Compression
creative skill
deoxyribonucleic acid
different scientific studies
DNA nucleotides
scientific concepts
sequential technique
simultaneous approach
simultaneous compression
simultaneous technique
standard compression techniques
time consumption
biblio
Selection Mechanism for Underwater Multi-Media Communication
Submitted by
aekwall
on Mon, 03/02/2020 - 11:35am
Scalability
Resiliency
pubcrawl
energy conservation
telecommunication power management
Metrics
Energy Efficiency
Data Transmission
Multimedia communication
Energy
telecommunication network reliability
access protocols
acoustic
acoustic medium
Earth's surface
harsh underwater environment
medium access control layer
multi-media
propagation delay
selection mechanism
underwater acoustic communication
underwater MAC protocols
underwater multimedia communication
underwater single medium communication
visible light communication (VLC)
Visible Light medium
Underwater Networks
biblio
A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal
Submitted by
grigby1
on Wed, 02/26/2020 - 3:34pm
Adaptive Information Dissemination
Adaptive Information Dissemination (AID)
attacker
composability
Compositionality
data privacy
Data Transmission
different occurrences ease
direction-finding procedure
fuzzy trust approach
hybrid approach
inaccessible systems
Informatics
information dissemination
internet
Internet of Things
Internet of Things (IoT)
Internet of Things gadgets
IoT
MANET Attack Detection
manet privacy
Metrics
mobile ad hoc networks
Mobile Ad-Hoc Network (MANET)
Mobile Ad-hoc Network host
mobile radio
packet count
privacy
Protocols
pubcrawl
Resiliency
route detection
route discovery
Routing
Routing protocols
Scalability
Secure Autonomic Mobile Ad-hoc Network
telecommunication network routing
trust administration approach
Trust estimation dependent
trust management approach
trust organization approaches
Trust Routing
trusted path
trusted Routing proposal
wireless sensor networks
biblio
Research on Self-Healing Technology for Faults of Intelligent Distribution Network Communication System
Submitted by
grigby1
on Mon, 02/17/2020 - 4:13pm
Business
Circuit faults
Communication networks
composability
computerised monitoring
data analysis
Data Transmission
distribution network data monitoring
distribution network self-healing control
intelligent decision
intelligent distribution network communication system faults
intelligent power communication network
maintenance engineering
Monitoring
optimal control
power distribution control
power distribution faults
power engineering computing
power grids
power system
power system security
pubcrawl
Real-time monitoring
resilience
Resiliency
self-healing control
self-healing networks
self-healing technology
SHC
Smart Grids
smart power service
1
2
3
next ›
last »