Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Throughput
biblio
A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks
Submitted by
grigby1
on Thu, 12/05/2019 - 9:56am
anti-jamming channel hopping protocol
Anti-jamming strategy
channel hopping sequences
cognitive radio
cognitive radio networks
Cognitive radio networks (CRNs)
Cognitive Radio Security
computer science
CRN
Extended Langford pairing (ELP)
flexible anti-jamming channel hopping
frequency hop communication
Jamming
LAA scheme
load awareness anti-jamming channel hopping scheme
Load modeling
Oceans
Protocols
pubcrawl
resilience
Resiliency
SU node
telecommunication security
Throughput
Topology
traffic load
wireless channels
biblio
Physical Layer Security in Wireless Information and Power Transfer Millimeter Wave Systems
Submitted by
grigby1
on Wed, 11/27/2019 - 2:01pm
Communication system security
composability
confidential information rate
effective secrecy throughput
energy coverage
energy-information coverage probability
Information rates
Metrics
Millimeter-wave (mmWave)
network parameters
physical layer security
physical layer security performance
power transfer millimeter wave systems
power transfer millimeter wave ultra-dense network
probability
pubcrawl
reliable transmission performance
resilience
Resiliency
secrecy performance
secrecy probability
secure transmission performance
simulation results
simultaneous wireless information
stochastic geometry framework
SWIPT
Switches
telecommunication network reliability
telecommunication security
Throughput
wireless channels
Wireless communication
wireless sensor networks
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by
grigby1
on Tue, 10/15/2019 - 1:45pm
3DES
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
decryption time
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
Memory management
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
secure data transfers
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
biblio
Covert Communication Under Channel Uncertainty and Noise Uncertainty
Submitted by
grigby1
on Thu, 09/05/2019 - 10:25am
resilience
Scalability
telecommunication security
error statistics
Signal to noise ratio
uncertainty
Compositionality
Data protection
Probability density function
Channel estimation
Throughput
covert channels
average probability
average probability of detection error
channel gain
channel uncertainty
covert communication
covert throughput gain
covert throughput loss
eavesdropper
fading channels
Gain
low probability of detection communication
noise power
noise uncertainty
Rayleigh channels
Rayleigh fading channel
receive SNR
signal transmission
user privacy protection
biblio
RMDD: Cross Layer Attack in Internet of Things
Submitted by
grigby1
on Mon, 08/26/2019 - 10:10am
6LoWPAN
brutal attack
composability
computer network security
coordinated attack
Cross Layer Security
cross-layer
DAG
DODAG
intelligent attack
intensity attack
Internet of Things
IoT
IPv6
PAN
pubcrawl
rank manipulation and drop delay cross-layer attack
resilience
Resiliency
Routing
Routing protocols
RPL
security
Simultaneous attack
single protocol layer
stealthy attack
TCP
telecommunication network topology
Throughput
biblio
Mitigating wormhole attack in MANET using absolute deviation statistical approach
Submitted by
aekwall
on Mon, 06/10/2019 - 9:16am
absolute deviation
absolute deviation correlation coefficient
absolute deviation statistical approach
AD correlation
Color
composability
Correlation
correlation coefficient
correlation methods
covariance
fake tunnel
MANET
MANET Attack Mitigation
MATLAB simulator
Metrics
mobile ad hoc networks
Peer-to-peer computing
pubcrawl
Resiliency
telecommunication network routing
telecommunication security
Throughput
wormhole attack
wormhole attack mitigation
biblio
ReverseRoute: An Application-Layer Scheme for Detecting Blackholes in MANET Using Mobile Agents
Submitted by
aekwall
on Mon, 06/10/2019 - 9:15am
application-layer scheme
Blackhole attack
composability
detection mechanism
effective application layer based intrusion detection scheme
Intrusion Detection
lower layers
MANET
MANET Attack Detection
Metrics
mobile ad hoc networks
mobile agents
mobility speeds
multiple blackhole nodes
pubcrawl
Resiliency
Routing
Routing protocols
security attacks
simple application layer based intrusion detection scheme
single nodes
telecommunication security
Throughput
biblio
Intrusion Detection System for MANET
Submitted by
aekwall
on Mon, 06/10/2019 - 9:14am
black hole
composability
data packets
defense mechanism
gray hole
IDS
Intrusion Detection
intrusion detection system
malicious nodes
MANET
MANET Attack Detection
Metrics
mobile ad hoc networks
mobile ad-hoc network
notice participation
packet delivery ratio
pubcrawl
Resiliency
Routing
routing attacks
Routing protocols
single malicious node
telecommunication network routing
telecommunication security
Throughput
trust relationship
biblio
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform
Submitted by
grigby1
on Wed, 03/06/2019 - 3:24pm
Autonomic Security
Big Data
Big Data challenge
composability
custom-built distribution solution
cyber-attacks
Distributed databases
distributed processing
distributed SIEM platform
distribution frameworks
event processing
in memory database
in-memory database
in-memory platform
malicious activities
normalization
persistence speed
persists event data
Pervasive Computing Security
pubcrawl
resilience
Resiliency
security
security analytics
security events
security information and event management system
security of data
security operator
security-related event logs
security-related events
SIEM
storage management
Storms
Throughput
tuning options
biblio
A Low Power Cybersecurity Mechanism for WSNs in a Smart Grid Environment
Submitted by
grigby1
on Mon, 11/19/2018 - 11:31am
CIP
CIP-002 standards
CIP-009 standards
communication functionalities
Compositionality
computer security
critical infrastructure protection standards
critical power grid infrastructure
Cybersecurity
cybersecurity requirements
delay
Denial-of-Sleep Attack
Distributed Sensing
Human behavior
Human Factors
low power consumption
low power cybersecurity mechanism
MAC layer
Monitoring
NERC
NERC CIP requirements
NERC CIP standards
North American Electric Reliability Corporation
phasor measurement
Phasor measurement units
power consumption
power system security
pubcrawl
Receivers
resilience
Resiliency
security of data
sensor devices
smart grid cybersecurity
smart grid environment
smart grid monitoring application
Smart Grids
Smart Grid Sensors
smart power grids
Substations
Throughput
wireless sensor networks
WSN cybersecurity mechanism
WSNs
WSN security mechanisms
1
2
3
4
5
6
next ›
last »