Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
modulation
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by
grigby1
on Thu, 09/05/2019 - 10:25am
internet
security
delays
resilience
Scalability
computer network security
Entropy
telecommunication traffic
security attacks
Compositionality
modulation
Receivers
Noise measurement
covert channels
information security
system security policies
telecommunication channels
channel entropy
communication contrary
Convert Channel
covert storage channels
disclosure information
entropy threshold
entropy-based detection method
memory storage
public access permission
timing channel
victim
Web
Web covert timing channels detection
web vulnerabilities
Web weaknesses
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by
grigby1
on Fri, 03/15/2019 - 10:59am
amplitude analysis
detection method
formidable alternative
Hardware
Heating systems
infrared imaging
infrared signals
infrared thermography
integrated circuits
invasive software
Lock-in Thermography
measurement platform
modulation
Phase
phase information
Phase measurement
pubcrawl
stealthy hardware Trojan detection
Temperature measurement
Thermal Mapping
thermal scans
Trojan detection
trojan horse detection
Trojan horses
weak thermal hot spots
biblio
Air-Gap Data Transmission Using Screen Brightness Modulation
Submitted by
grigby1
on Thu, 01/31/2019 - 11:12am
Air gaps
air-gap data transmission
Air-gap transmission
Band-pass filters
BFSK
BFSK digital modulation
Brightness
Cameras
composability
computer virus
computer viruses
data communication
data communication channel
Demodulation
Digital demodulation
error statistics
frequency shift keying
Human behavior
Image Processing
Metrics
modulation
Monitoring
pubcrawl
resilience
Resiliency
screen brightness modulation
unidirectional transmission
biblio
Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System
Submitted by
grigby1
on Mon, 01/21/2019 - 11:20am
security
pubcrawl
Metrics
Resiliency
Scalability
telecommunication security
Signal to noise ratio
light emitting diodes
optical communication
Apertures
data communication
Data Transmission
eavesdropping
indoor communication
indoor communication performance
lighting
modulation
optical links
optical wireless interception vulnerability analysis
receiver aperture
Receivers
signal to noise ratio threshold
visible light communication system
Visible Light Communications Security
biblio
Software Defined Radio Based Mixed Signal Detection in Spectrally Congested and Spectrally Contested Environment
Submitted by
grigby1
on Wed, 04/11/2018 - 1:54pm
carrier frequency
cyber physical systems
cyber security application
cyclostationary domain analysis
Detectors
frequency domain analysis
frequency-domain analysis
Generators
graphical user interface
graphical user interfaces
GUI
initial phase offset
initial time delay
Metrics
mixed signal detection
modulation
multiple signal
parameter estimation
pubcrawl
pulse shaping filter
Radio frequency
resilience
Resiliency
RF signal component
RF signals
Scalability
SCF cyclostationary feature
SDR based implementation
second order spectrum correlation function cyclostationary fea- ture
security
signal detection
signal generators
Software
software defined radio based mixed RF signal generator
software defined radio based mixed signal detection
software radio
spectrally congested environment
spectrally contested environment
symbol rate
telecommunication security
time domain analysis
Time Frequency Analysis
Time-frequency Analysis
biblio
A secure and reliable channel error correction technique for picode
Submitted by
grigby1
on Tue, 01/23/2018 - 1:59pm
2D Barcode
Algorithm design and analysis
BCH code
Cryptography
cyber physical systems
Decoding
encoding
modulation
pubcrawl
QR codes
Reed-Solomon codes
Resiliency
Robustness
Two dimensional displays
biblio
A MIMO cross-layer secure communication scheme based on spatial modulation
Submitted by
grigby1
on Wed, 01/10/2018 - 11:21am
Bit error rate
composability
Cross Layer Security
Cross-Layer Security
Cryptography
Demodulation
distorted signal design
eavesdropper error rate
legitimate user
MIMO
MIMO communication
MIMO cross-layer secure communication scheme
modulation
multiple input multiple output system
Physical layer
physical layer security
pubcrawl
radio reception
Receivers
reception demodulation performance
Resiliency
security
security information transmission
spatial modulation
telecommunication security
transmitting antennas
upper layer stream cipher
biblio
Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation
Submitted by
grigby1
on Wed, 01/10/2018 - 11:21am
adaptive modulation
ARQ
Automatic repeat request
composability
Cross Layer Security
cross MAC-PHY layer security design
Decoding
diversity reception
fading channels
maximal ratio combination
Measurement
modulation
MRC
packet error rate formula
PER formula
physical-MAC layer security design
pubcrawl
quality of service
Rayleigh channels
Rayleigh fading channel
Receivers
Resiliency
security
security performance
telecommunication security
Wireless communication
wireless service confidentiality
biblio
PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices
Submitted by
K_Hooper
on Wed, 01/10/2018 - 10:09am
acoustic communication
Acoustic communication (telecommunication)
Acoustic Fingerprints
authentication
authorisation
composability
differential pulse position modulation
estimation
estimation theory
fingerprint scan
Human behavior
message authentication
modulation
password
PCASA
Portable computers
Protocols
proximity based continuous and secure authentication
pubcrawl
pulse modulation
Resiliency
secure proximity estimation
user personal portable devices
wearable computers
biblio
"Survey on Clean Slate Cellular-IoT Standard Proposals"
Submitted by
grigby1
on Tue, 02/21/2017 - 10:52am
C-IoT
cellular automata
cellular Internet of Things
clean slate cellular-IoT standard proposals
Clean Slate Proposals
clean slate technology
Evaluation of C-IoT
GSM
Internet of Things
Internet of Things Standards
Low Power Wide Area
low power-wide area network technologies
LPWA technologies
modulation
power aware computing
Power demand
Proposals
Protocols
pubcrawl170103
system level evaluation
1
2
next ›
last »