Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
telecommunication computing
biblio
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach
Submitted by
aekwall
on Mon, 12/09/2019 - 11:23am
Conferences
Trusted Computing
pubcrawl
composability
wireless sensor networks
Decision Making
Correlation
mobile radio
telecommunication computing
sensors
Compositionality
beta-trust
cleaning
context-aware
data handling
data imprecision
diversified trust portfolio
DTP
financial markets theory
Mobile wireless sensor networks
MWSN
online context-aware data cleaning method
online data cleaning
Portfolios
sensor data accuracy trustworthiness
spatially autocorrelated candidate sensors
Trajectory
trust diversification
Computing Theory and Trust
biblio
Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks
Submitted by
grigby1
on Thu, 12/05/2019 - 9:52am
clean slate
clean-slate design
collaboration
convergence
DARPA SC2
deep reinforcement learning
deep-reinforcement learning multiple access
design framework
DLMA
DRL agent
DRL algorithmic framework
heterogeneous wireless networks
Human behavior
Human Factors
learning (artificial intelligence)
MAC design
machine learning
machine-learning technique
Media Access Protocol
Metrics
network layers
neural nets
Neural networks
optimal MAC strategy
Policy
Policy Based Governance
policy governance
prior knowledge
pubcrawl
radio networks
resilience
Resiliency
Robustness
share spectrum
telecommunication computing
time division multiple access
time-slotted networks
traditional reinforcement learning
universal MAC protocol
wireless networks
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by
grigby1
on Mon, 06/10/2019 - 12:56pm
Bayes methods
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
k nearest neighbor
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
Mathematical model
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
resilience
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by
grigby1
on Wed, 05/01/2019 - 10:33am
access protocols
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
learning (artificial intelligence)
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
pubcrawl
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
security
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
biblio
SELF-HEALING AND RESILIENCE IN FUTURE 5G COGNITIVE AUTONOMOUS NETWORKS
Submitted by
aekwall
on Mon, 03/25/2019 - 8:55am
learning (artificial intelligence)
machine learning
pubcrawl
composability
optimization
Reliability
Anomaly Detection
self-healing
5G mobile communication
automated anomaly detection
Case-Based Reasoning
cognitive network management
critical machine-type communication
degraded states
diagnosis function
future 5G cognitive autonomous networks
future cognitive autonomous mobile networks
future network deployments
gaussian distribution
key requirements
Long Term Evolution
managed network functions
mobile network self-healing
multidimensional statistical methods
radio access networks
resilience
self-healing functions
SON
SON self-healing
sophisticated machine learning methods
statistical analysis
telecommunication computing
ultra-high reliability
self-healing networks
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by
grigby1
on Mon, 01/21/2019 - 11:15am
Address autoconfiguration
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Human behavior
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
passive analysis
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
test maintainability
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
biblio
Investigating and securing communications in the Controller Area Network (CAN)
Submitted by
grigby1
on Wed, 09/05/2018 - 9:55am
security
pubcrawl
Resiliency
authentication
communication security
Protocols
Conferences
message authentication
computer network security
Network
automobiles
resilience
telecommunication computing
DoS attacks
automobile
broadcast communication
broadcast communications network
CAN
CAN bus nodes
CAN protocol security features
CAN-related systems
controller area network
controller area networks
denial-of-service attacks
field buses
light emitting diodes
standard communication network
telecommunication networks
controller area network security
biblio
Using k-nearest neighbor method to identify poison message failure
Submitted by
grigby1
on Fri, 07/06/2018 - 1:06pm
AI Poisoning
Computer bugs
computer science
control systems
Data mining
Human behavior
IP networks
Large-scale systems
learning (artificial intelligence)
machine learning
network fault management
poison message failure identification
probabilistic k-nearest neighbor method
Probability distribution
Protocols
pubcrawl
resilience
Resiliency
Routing
Scalability
statistical distributions
System testing
telecommunication computing
telecommunication network management
telecommunication network reliability
telecommunication security
telecommunications networks
Telephony
Toxicology
unstable network
biblio
Adaptive Root Cause Analysis for Self-Healing in 5G Networks
Submitted by
grigby1
on Mon, 03/05/2018 - 12:21pm
5G
5G mobile communication
5G networks
adaptive learning
adaptive root cause analysis
adaptive systems
ARCA
automated evidence based RCA
automated fault detection
Bayes methods
Bayesian network theory
belief networks
Cellular networks
composability
domain knowledge reuse
fault detection
fault diagnosis
fault tolerant computing
Incomplete Data
learning (artificial intelligence)
Long Term Evolution
LTE Advanced
LTE-A
Manuals
network data
network experts
pattern classification
probabilistic Bayesian classifier
probability combinations
probable root cause
pubcrawl
quality of service
RCA process
resilience
Resiliency
return on investment
ROI
Root cause analysis
self-healing
self-healing networks
self-organising feature maps
self-organizing network
SH
SON based solutions
stratified synthesized data
telecommunication computing
biblio
High Performance and High Scalable Packet Classification Algorithm for Network Security Systems
Submitted by
grigby1
on Wed, 02/21/2018 - 12:37pm
Buildings
cache-aware table structure
Classification algorithms
computer network security
Decision trees
general hardware architectures
hardware-based solutions
Heuristic algorithms
high performance packet classification algorithm
high scalable packet classification algorithm
high-performance systems
integrated inter- and intra-table search
Metrics
Multicore Computing
multicore computing security
multicore multithreaded processors
network security systems
packet classification
packet classification accelerator chips
parallel processing
partition decision trees
partitioning
Partitioning algorithms
partitioning-based packet classification algorithms
pattern classification
pubcrawl
resilience
Resiliency
Scalability
search table
security
software-based packet classification algorithms
T-CAM
telecommunication computing
telecommunication traffic
ternary content addressable memory
1
2
3
next ›
last »