Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
5G mobile communication
biblio
AI-driven Zero-touch Operations, Security and Trust in Multi-operator 5G Networks: a Conceptual Architecture
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
computer architecture
security
pubcrawl
Human Factors
policy-based governance
resilience
Resiliency
telecommunication security
Scalability
5G mobile communication
quality of service
Artificial Intelligence
mobile computing
telecommunication network management
Europe
5G
ubiquitous computing
network services
automation
5G initial visions
5G network solutions
AI-driven operations
automated end-to-end network operations
cognitive network orchestration
conceptual architecture
cross-domain security
distributed Artificial Intelligence
distributed ledger technologies
distributed security
highly pervasive network
minimal manual interventions
multioperator 5G networks
Pervasive networking
QoS profiles
service lifecycle automation
Spectrum sharing
truly production-level stage
trust architecture
trust orchestration mechanisms
Zero Touch Automation
zero-touch automation
zero-touch security
zero trust
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
computer architecture
security
Peer-to-peer computing
pubcrawl
Metrics
resilience
Resiliency
Throughput
telecommunication security
5G mobile communication
cellular radio
composability
Protocols
wireless network
Communication networks
telecommunication network reliability
cooperative communication
network coding
5G
Microprocessors
next generation networks
dense network coding
device to device communication
fifth generation of communication networks
malicious user identification scheme
network coding environment
next generation communication technologies
Pollution
reliable communication
small cell technology
Small Cells
biblio
Liability-Aware Security Management for 5G
Submitted by grigby1 on Tue, 02/23/2021 - 1:25pm
5G
5G mobile communication
5G networks
accountability mechanism
composability
inherent distribution
LASM
Liability
liability-aware security management
Metrics
multiple entities
network accountability
network slicing
orchestration decisions
proof of transit
pubcrawl
Remote Attestation
reputation models
resilience
Resiliency
Root cause analysis
security of data
Security SLAs (SSLAs)
security-by-contract
telecommunication computing
transaction processing
trust and reputation models
Trust models
biblio
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
Submitted by grigby1 on Tue, 02/16/2021 - 11:47am
learning (artificial intelligence)
pubcrawl
Metrics
resilience
Resiliency
Throughput
optimization
5G mobile communication
radio access networks
composability
telecommunication computing
resource allocation
Dynamic scheduling
Radio Access Network
resource management
Reinforcement learning
Bit error rate
5G radio access network slicing
5G security
computational constraints
Dynamic Resource Allocation
dynamic resource optimization
frequency-time blocks
network optimization
network slice requests
network slicing
Q-learning solution
dynamic networks
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
security
Servers
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
5G mobile communication
network security
Compositionality
timing
Transmitters
covert timing channel
covert channel
Interference
covert channels
Jamming
radiofrequency interference
5G mobile network
5g network
co-constructing and sharing
distributed jamming system
distributing jammer
diversity networks
diversity reception
fifth generation mobile network
interference algorithm
jam system
modulation
modulation method
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
Internet of Things
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Cryptography
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
5G wireless networks
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
secrecy key size
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
biblio
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge Computing
Submitted by grigby1 on Wed, 12/02/2020 - 1:03pm
5G
5G mobile communication
5G networks
central cloud-based approach
central server
Cloud Computing
computer architecture
control and user plane separation
coupled congestion control
CUPS
data traffic
Dynamic mapping
dynamic mapping traffic
edge computing
edge computing architecture
edge servers
global dynamic mapping information
Intelligent Transportation Systems
Internet of Things
IoT
local edge server
Logic gates
mobility management (mobile radio)
next generation automotive edge computing
next generation networks
next-generation intelligent transportation system
Prototypes
pubcrawl
resilience
Resiliency
response latency
road traffic
Scalability
Servers
synchronisation
telecommunication control
telecommunication traffic
traffic accidents
traffic engineering computing
vehicle dynamics
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
computer network security
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
security threats
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
3D PAKE protocol
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
heterogeneous networked society
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
biblio
Fog Radio Access Networks in Internet of Battlefield Things (IoBT) and Load Balancing Technology
Submitted by grigby1 on Tue, 11/17/2020 - 1:49pm
5G mobile communication
bandwidth efficiency
battlefield efficiency
battlefield Things
C-RAN
Cloud Computing
cloud radio access networks
computer architecture
computing ability
computing capability
content sharing scheme
delays
distributed computing
distributed computing load balancing problem
edge computing
Energy Efficiency
F-RAN architecture
F-RAN nodes
fifth generation communication
Fog computing
fog equipment
Fog Radio Access Network
Fog Radio Access networks
Human Factors
Industrial Internet of Things (IIoT)
Industrial IoT
Internet of Things
Internet of Things knowledge
iobt
IoT devices
joint distributed computing
load balancing strategy
load balancing technology
Load management
local computing
military communication
mobility management (mobile radio)
network edge
pubcrawl
radio access networks
resource allocation
Scalability
ultra low latency
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
security
security of data
critical infrastructure
critical infrastructures
Resiliency
pubcrawl
vulnerabilities
Companies
Government
Software Architecture
5G mobile communication
resilience
Telecommunications
threats
Communications
security approach
disasters
natural disasters
criminal attacks
extreme weather events
holistic situation awareness
RESISTO H2020 EU-funded project
risk mitigation
telecom infrastructures
Resilient Security Architectures
1
2
3
4
5
6
next ›
last »