Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Synchronization
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
compiler security
Compositionality
concurrency control
Concurrent computing
data structures
different covert channels
features asynchronous exceptions
IFC language
Instruction sets
language constructs
language-based information-flow control techniques
Libraries
Metrics
program compilers
program diagnostics
program invariants
program verification
programming
programming language semantics
pubcrawl
Resiliency
Runtime
Runtime system
Scalability
security
security of data
Synchronization
telecommunication security
Theorem Proving
biblio
How to Securely Prune Bitcoin’s Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
bitcoin
Bitcoin network
block pruning
blockchain
blockchain size
bootstrapping
CoinPrune
Cryptography
decentralized cryptocurrency
electronic money
financial data processing
Human behavior
Peer-to-peer computing
pubcrawl
Scalability
securely prune Bitcoin's blockchain
security
serious scalability issues
snapshots
Synchronization
velvet fork
biblio
LoRa Mesh Network with BeagleBone Black
Submitted by aekwall on Mon, 03/01/2021 - 4:43pm
IoT
Internet of Things
Linux
Resiliency
pubcrawl
composability
Synchronization
Wireless communication
Metrics
Python
Bandwidth
Mesh networks
wireless mesh networks
Computers
encoding
relay networks (telecommunication)
relay
Low power
spread spectrum communication
radio transceivers
transceivers
BeagleBone Black
BeagleBone Black wireless single-board Linux computers
chirp spread spectrum
coding rate
long range
long range transceivers
lora
LoRa mesh network
LoRa node
MESH network
Python code
receiving nodes
spread factor
transmission intervals
transmitting nodes
Wireless Mesh Network Security
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
collision probability
concurrency control
Cryptographic Protocols
cryptographically secure random values
Cryptography
Databases
decentralized identifier distribution
IP networks
moving target defense
network entity identifiers
Network Identification
Network reconnaissance
network security
network security objectives
proactive defense
protocol
Protocols
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
synchronisation
Synchronization
timestamp-based concurrency control algorithms
Twitter
unique universal identifiers
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 2:39pm
security of data
Cyber-security
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Protocols
delays
malware
advanced persistent threat
APT
synchronisation
cyber-attacks
Synchronization
Degradation
Clocks
advanced persistent threats
computer clocks
IEEE 1588
precision time protocol
programmable injector device
programmable Man-in-the-Middle
PTP
PTP infrastructure components
PTP time synchronisation networks
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
chaotic cryptography
pubcrawl
4-dimension chaotic system
chaotic communication
chaotic cryptosystem
chaotic cryptosystem solution
computer network security
Cryptographic Protocols
Cryptography
data phase transfer
DH-HEMTs
field programmable gate arrays
FPGA
FPGA implementation
IKE
IKE protocol
internet
Internet key exchange protocol
IPsec
IPSec protocol
keys phase exchange
man in the middle attack
network communication domain
network protocol
Protocols
SA
securing communications
security association attack
Synchronization
word length 128 bit
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
chaotic cryptography
pubcrawl
asymmetric cryptography method
chaotic communication
chaotic signal simulation
chaotic synchronization
Cryptography
dynamic systems
Dynamical Systems
encryption circuit
field programmable gate arrays
FPGA
Hopfield neural nets
Hopfield neural networks
human body
information security
Neural networks
random number generation
random number sequence
reconfigurable architectures
reconfigurable hardware
synchronisation
Synchronization
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
telecommunication security
Protocols
Communication system security
Wireless communication
composability
fingerprint identification
Synchronization
Physical layer
Clocks
bluetooth security
software radio
authentication layer
Bluetooth devices fingerprinting
Bluetooth scan
communication protocol
low cost SDR
physical-layer fingerprinting approach
Software Defined Radios
transmitters identification
wireless communication scheme
wireless security
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
address randomization
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
BT spectrum analysis
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
high data rates
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
resilience
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
biblio
EMPTCP: An ECN Based Approach to Detect Shared Bottleneck in MPTCP
Submitted by grigby1 on Wed, 12/02/2020 - 2:03pm
Bandwidth
bottleneck link
computer networks
coupled congestion control
delays
ECN scheme
EMPTCP
end-to-end delay
enhanced MPTCP protocols
lightweight yet accurate approach
MPTCP sender
Multimedia communication
multiple bottleneck scenario
network efficiency
Protocols
pubcrawl
real time networks
real time protocol
real-time systems
resilience
Resiliency
Scalability
shared bottleneck detection scheme
subflows
Switches
Synchronization
telecommunication congestion control
transport protocols
1
2
3
4
5
6
7
next ›
last »