Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
energy consumption
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
encryption
Internet of Things
Raspberry Pi
embedded devices
Linux
Resiliency
Human behavior
pubcrawl
composability
Metrics
public key cryptography
energy consumption
microprocessor chips
decryption process
Asymmetric Encryption
Linux operating system
Internet of Things structure
microprocessor platform
Optimal Asymmetric Encryption Padding (OAEP)
Rabin-p
Rabin-p cryptosystem
Rabin-P encryption scheme
Raspberry Pi setup
Raspbian
Raspbian OS
Rivest-Shamir-Adleman (RSA)
RSA-OAEP cryptosystem
RSA-OAEP encryption scheme
biblio
Blackhole Attack Detection Using Machine Learning Approach on MANET
Submitted by aekwall on Mon, 12/14/2020 - 11:29am
ad hoc network
security
Ad hoc networks
Ad-hoc-on-Demand Distance Vector
AODV
artificial neural network
black hole AODV
Black hole attacks
Blackhole Attack (BA)
blackhole attack detection
composability
delays
energy consumption
high QoS parameter
learning (artificial intelligence)
machine learning approach
MANET
mobile ad hoc networks
Mobile Ad-hoc Network consists
Mobile adhoc Network
mobile radio
neural nets
on-demand routing mechanism
Predictive Metrics
pubcrawl
quality of service
Resiliency
Routing protocols
Secure AODV
security mechanism
security of data
self-configurable type
support vector machine
Support vector machines
Support Vector Model
telecommunication security
Throughput
time 37.27 ms
biblio
SharaBLE: A Software Framework for Shared Usage of BLE Devices over the Internet
Submitted by grigby1 on Tue, 12/01/2020 - 3:38pm
application program interfaces
BLE-equipped device
Bluetooth
bluetooth low energy
Cloud Computing
cloud-based software framework
collaboration
composability
computer network reliability
energy consumption
generic service stack
Human behavior
Human Factors
internet
Internet of Things
Internet-scale Computing Security
Logic gates
Metrics
Policy Based Governance
pubcrawl
remote BLE IoT devices
resilience
Resiliency
RESTful API
Scalability
Servers
short communication range
Software
wireless communication technologies
biblio
Synthesizing Energy Consumption Data Using a Mixture Density Network Integrated with Long Short Term Memory
Submitted by grigby1 on Fri, 11/20/2020 - 1:06pm
Logic gates
privacy
Predictive models
data analysis
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
security
data privacy
Scalability
Data models
power engineering computing
smart meters
smart power grids
standards
composability
energy consumption
data storage
Probability density function
Power Grid
Communication networks
data dissemination
information dissemination
smart cities
LSTM
privacy concerns
centralized data analytics
commercial consumer energy consumption
data synthesis
fully synthetic energy consumption data
human behavioral impacts
load patterns
long short-term memory network
MDN
mixture density network
multiple critical infrastructures
residential consumer energy consumption
residential smart meters
smart grid consumer privacy
biblio
Smart Meters for Domestic Consumers: Innovative Methods for Identifying Appliances using NIALM
Submitted by grigby1 on Fri, 11/20/2020 - 1:06pm
privacy
feature extraction
Monitoring
pubcrawl
Human behavior
Metrics
policy-based governance
collaboration
resilience
Resiliency
Scalability
smart power grids
composability
sensors
energy consumption
smart meters
innovative methods
Aggregates
monitoring process
domestic appliances
demand response
appliances identification
demand side management
electricity energy
electricity power
energy management
Home appliances
ICA
independent component analysis
Indian domestic consumers
MPS
NIALM
non commercialization
particular load
single point sensing
SPs
Wiring
smart grid consumer privacy
biblio
Load Forecasting of Privacy-Aware Consumers
Submitted by grigby1 on Fri, 11/20/2020 - 1:03pm
collaboration
composability
consumer aggregation levels
consumer privacy
consumer privacy risks
data privacy
data-driven grid management
Electric Grid
energy consumption
forecast accuracy
forecasting
grid visible consumer load profile
high spatial resolutions
higher aggregation levels
Human behavior
load forecasting
Load modeling
load profiles
load-forecasting
load-levelling scheme
Metrics
model-distribution predictive control
Mutual information
planning techniques
policy-based governance
polling frequency constraints
power engineering computing
predictive control
Predictive models
privacy
privacy protection schemes
privacy-aware consumers
pubcrawl
regression analysis
report consumption data
resilience
Resiliency
Scalability
short-term load forecasts
SM data
smaller consumer aggregations
smart grid consumer privacy
smart meter
smart meters
STLF accuracy
Support vector machines
support vector regression
temporal resolutions
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 1:39pm
security
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
Instruction sets
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
power aware computing
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
frequency regulator
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
cluster head
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
Energy states
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
lower capacity resources
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
pubcrawl
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
biblio
Cyber security issues of Internet of electric vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 11:11am
5G
batteries
battery limit
Charging stations
connected vehicles
cyber security issues
Electric Vehicles
electrical vehicle communication
energy conservation
energy consumption
Energy Efficiency
environmental benefits
Human Factors
Infrastructure
Intelligent Transportation Systems
internet
Internet information exhange
Internet of electric vehicles
Internet of Things
Internet of Vehicles
IoEV
Metrics
MFemtocell
pubcrawl
resilience
Resiliency
Roads
security
security of data
sensors
Servers
biblio
Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
data privacy
telecommunication security
Resiliency
Human behavior
pubcrawl
Routing protocols
Wireless Sensor Network
wireless sensor networks
sensor nodes
Metrics
energy consumption
Compositionality
sensor node
source location privacy
routing schemes
source location privacy routing schemes
angle-based routing
control angle
dynamic route creation process
energy consumption performance
Experimental Evaluation
guarantee longer network lifetime
inversely proportional relationship
modified schemes
relatively lower energy
route node
Location Privacy in Wireless Networks
1
2
3
4
5
6
7
next ›
last »